Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

IBM Lotus Notes/Domino

     product suite

     public key security in

     security displays

identification

     authentication process 2nd

     biometric authentication 2nd 3rd

         keystroke authentication applications

     cookies and

     cues, spoofing

     unique, with referrers/third-party cookies

     user-assigned identifiers

identity

     certificates

     theft

informance, interface design

information

     about users, collecting/analyzing with online tools

     ease of finding, as influence on trust

     flow of

         avoid obscuring

         coarse-grained control 2nd

         mental models of

     personal

         as exoinformation

         handling, communicating policies

         user control

         user control, automated tools

         user control, nuances of 2nd

     processing by users

     public sources for security tools

     publicizing, concerns about

     sensitive, on discarded hard drives

     systems, informed consent model

Information Society Technology Programme (ISTAG)

informed consent

     browsers as gatekeepers to

         browser redesign

     by design

     cookie handling, browser redesign

     model for information systems

     scope of

instant messaging

     disclosure function

         halting/resuming

     exploiting plausible deniability

     security administrators, communications among

     symmetric design, supporting information flow

Instant Trust Infrastructure (ITI)

integrity, trustworthiness and

Intel Pentium III processor, security/privacy issues

interface

     as trust factor

     design

         adaptive systems

         clustering users

         information visualization principles 2nd 3rd

         PGP v5.0

         ubiquitous computing

         user accommodation

         user customization

         user privacy concerns

         validation of

     error in Mac OS 10.3

     HCI and

     prototypes

     psychological manipulation of users

     simplicity and

     socially aware

     style guide

     testing design/usability of

International Security, Trust & Privacy Alliance (ISTPA) Privacy Framework

Internet

     online banking example

     secure, building

         multi-ring high-security environment

     trust and

         design examples

     viruses/worms

Internet Explorer

     consent dialogs

     extensibility of, Bugnosis user interface

     file download dialogs

     remote software installation

     SpoofGuard

     spoofing identification cues

     version 5, Privacy Bird add-on

    version 6

         P3P functionality in

         Privacy Bird add-on

interprocess communication, Chameleon

intrusion detection systems 2nd

IP addresses

     checking for MyDoom virus

     phishing attacks and

iPKIs (instant PKIs) 2nd

     certificate authorities and

     Network-in-a-Box

     securing work group applications

     web servers as certificate authorities

iris verification, biometrics authentication

ISTAG (Information Society Technology Programme)

ISTPA (International Security, Trust & Privacy Alliance) Privacy Framework

ITI (Instant Trust Infrastructure)

Категории