Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

gambling sites, trusted design example

gaming/anti-gaming

Garfinkel, Simson L.

gesture-directed automatic configuration

Gmail (Google)

     informed consent

GNU Keyring application

GnuPG

Gnutella network 2nd

Goecks, Jeremy

GOL (Government OnLine)

Good, Nathaniel

Goverment OnLine (GOL)

graduated lockout feature, challenge questions systems

Grant, Alasdair

graphical authentication 2nd

     DAS

     position-based

     recognition-based

graphical password systems

     tapping/drawing images

graphical passwords 2nd

     abundance of

     authentication time

     creating systems using

         image-interpretation technique

         image-recognition technique

     drawbacks

     evaluating security of

         authentication schemes

         key-generation schemes

     evaluating usability of

     guessing

     key-generation systems and 2nd

     meaningfulness of

     predictability of

     retrieval strategy

     system-generated

     user-selected

guessing difficulty, security criterion for challenge questions system

GUIs (graphical user interfaces)

     conventions

     secure system design

     security mechanisms and

GVO (Groove Virtual Office)

     design

         core principles

Категории