Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

e-commerce transactions

     antecedents/consequences of trust for

     pre-interactional filters 2nd

     risk factors

     trust/cost as opposing factors

EAP-TLS (Extensible Authentication Protocol in TLS)

eBay

     hard disks purchased from, security of

     phishing attacks against customers

     trust issues

         design factors

email

     access to, securing

    attachments

         malware

         self-propagating

     exoinformation example

     Mixminion anonymizing network

     sanitizing, cryptographic approach to

     security administrators, communications among

     security alerts

     tracking, Bugnosis future directions

     viruses

Empty Trash command (Macintosh), replacing with Shred Trash command

encrypting

     data on backups 2nd

     email

     files

    messages

         IBM Lotus Notes/Domino

         user reluctance

     PGP v5.0, usability evaluation of

     symmetic key cryptography

enrollment

     biometric authentication 2nd

     iPKIs and

environment

     academic, persistent hacking attacks

     authentication and 2nd

     awareness of portable systems

     cultural panorama in product development

     high-security multi-ring, building Internet as

     knowledge of, system administrator requirement

     legal/regulatory, need for system design response to

     quarantined, for downloading exploits

     research, persistent hacking attacks

     security mechanisms, effective operation of

     ubicomp, privacy in

ERASE command (Windows)

ethnography, understanding user work practices

     HCI research

ettercap package

European Union privacy directive, ubicomb design guidelines

evaluating

     authentication mechanisms

         selection criteria

     biometric authentication systems

         keystroke systems, previous research

         performance

         user factors, including

     competitive systems, strengths/weaknesses

     Faces software prototype

     interface prototypes, heuristic reviews of

     PGP v5.0

     policy authoring in privacy policy management tool

     portable devices

     Privacy Bird

     privacy management systems

     privacy/security solutions

     technology, trustworthiness of

Evite social planning web site, web bug in email from

exformation

exoinformation 2nd

experience prototyping, interface design

experimental study, password selection

Extensible Authentication Protocol in TLS (EAP-TLS)

extensible markup language (XML), P3P and

Категории