Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DARPA (Defense Advanced Research Projects Agency), biometric research

DAS (Draw-a-Secret)

     graphical authentication

Defense Advanced Research Projects Agency (DARPA), biometric research

Déjà Vu

DELETE command/Delete key, Windows 2nd

     backups

Delphi method, validating Privacy Space Framework

Department of Defense sanitization standards

depth of processing, authentication memorability

design

     for usability

     phase, product development

         results of data analysis

designation, security by

designing secure systems 2nd 3rd 4th

     actual security versus theoretical 2nd

     biometric authentication

     challenges 2nd

     checklist

     conceptual approach

     Groove Virtual Office

     HCI methods/usability 2nd

     hybrid approaches

     informed consent by

     Internet, building secure

     minimizing user effort

     Mozilla Firefox

     PKIs

     privacy management systems

     social practice, supporting 2nd

     system requirements

     trust issues

     ubiquitous computing

     user accommodation

     user customization

     user goal orientation

     user privacy concerns

     user walkthroughs

     user-centered

     value-sensitive

     with challenge questions

desktop security

detection features, step in privacy process

detection tools

Dey, Anind K.

DHT (distributed hash tables)

dictionary attacks 2nd

Diffie-Hellman/DSS algorithms

digital rights management, keystroke biometrics

digital signatures

     on patches

     PGP v5.0

Dingledine, Roger

directly addressable user data

Disappearing Ink

disclosure

     ambiguous

     authentication security

     function, cell phones

     function, portable devices

     informed consent model

     user awareness and

distributed hash tables (DHT)

Document Object Model (DOM), Bugnosis architecture and

Dodgeball.com web site, privacy regulation, integrating

DOM (Document Object Model), Bugnosis architecture and

domain names, phishing attacks and

Domino applications

DOS 5.0, UNFORMAT utility

DoubleClick, Inc.

dual-code theory, picture effect

Durfee, Glenn

Категории