Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P2P (peer-to-peer)

P2P (peer-to-peer) systems, usability/privacy issues

     security guidelines

P3P (Platform for Privacy Preferences)

     informed consent and

     P3P policies

         Privacy Bird checking for

     P3P statements

     policies, Bugnosis future directions

     policy reference files

     user agents

         design challenges

         preferences

     W3C specifications 2nd

P3P 1.0 (Platform for Privacy Preferences 1.0) Specification

PACT (Psychological Aspects of Communication Technologies)

panorama, element of sociotechnical systems 2nd 3rd

     security development environment, influence of

     security mechanisms, context of

Passfaces

     login errors, minimizing

passfaces, password alternative

passive storage

passphrases

     password generation and

password selection

     beliefs about

     existing advice on 2nd

     experimental study

     graphical passwords, bias in

     human factors problem

     memorability

         security and, tradeoff

     recommendations

     restrictions on

     security administrators, recommendations

     security recommendations

     special characters/numbers 2nd

passwords

     associative

     authentication by 2nd

     challenge questions, differences

    changing

         login failures and

         password reminders and

     crackability

     cultural 2nd 3rd

    entering

         marching dots display

         Tresor rolling blackout display

     fake prompts

     guessing 2nd

     hardened, keystroke biometrics

     hashing

     ineffectiveness of 2nd

     key rings/wallets

     length, significance of

     mnemonics, based on

         difficulty of cracking

         memorability of

     proactive checking

     random

         authentication time

         centrally assigned

         meaningfulness of

         memorability of

         predictability of

     remembering 2nd

         difficulty of, security compromises

         methods of

         password reminders

         versus guessing

     resetting, user resistance to

     security recommendations

     smart cards

     SQLSnake/Spida worm

     types of

     users and

         demands on 2nd

         exploiting differences with attackers

         motivation

     writing down 2nd

patches

     ineffectiveness of

Patrick, Andrew S.

PayPal

     false expectations generated by

     forged web sites

PC operating systems, overwriting data and

Peacock, Alen

peer-to-peer (P2P)

Pentium III processor, security/privacy issues

per-files s attribute (Linux 0.4)

peripheral awareness systems, browser design

personal information

     as exoinformation 2nd

     automated tools for user control

     handling, communicating policies

     user control

     user nuanced control of 2nd

     users downloading

PETs (Privacy Enhancing Technologies)

PGP program

     encrypting email, user reluctance

     secure file deletion

     version 5.0

         cognitive walkthrough, results of

         evaluating

         interface design failures

         key types

         usability standard for

         user study

PGPTools display

phishing attacks 2nd 3rd 4th

     anatomy of, eBay example

     as semantic attacks

     defenses

         message retrieval

         SpoofGuard

         user action

     PKI and

     success of, MailFrontier study

     techniques

     trust exploitation

     user interface, fighting at

physiological characteristics, biometric authentication 2nd

Piazzalunga, Ugo

picture effect, graphical passwords and

PINs (personal identification numbers)

     keystroke biometrics

     memory demands on users, reducing

PKI (public key infrastructure) 2nd

     IBM Lotus Notes/Domino

     phishing attacks and

     problems with

     usable, creating

         Network-in-a-Box study

         wireless network deployments 2nd

Platform for Privacy Preferences 1.0 (P3P 1.0) Specification

plausible deniability

Polaris research project

pop-up windows

     blocking, Windows XP Service Pack 2

port 1034, MyDoom virus

portable devices

     biometric devices

     cell phones, disposable

     environmental awareness

     passive storage versus active storage

     telephones, balancing privacy and security

position, authentication mechanism based on

POSIX unlink( ) system call, changing semantics of

postrelease phase, product development

predictability, authentication security

prevention

     user awareness implications

privacy

     as process

     aspect of secure authentication

     awareness and, trade-offs

    biometric authentication

         monitoring users, concerns about

         user acceptance of

     challenge questions systems

     concept of, evolving

    concerns about

         informed consent

         Thunderwire study

         user differences

    designing for

         case study

         challenges 2nd

     features

     HCI and

     historical protections, erosion of

    mechanisms

         iterative design/develop/test

         social theories 2nd

     privacy policy management tool, usability case study

     privacy-affecting systems

     risk management/perception

     sociotechnical systems and

     software development, advice about

    ubicomp

         concerns about

         management of

     usability and

         P2P systems

     user-analysis with Bugnosis

     users

         awareness of protective behaviors

         control, nuances of 2nd

         information about, publicizing

         rights, colliding

Privacy Bird

     bird as personification of user agent

     cookie manager, integrating with

     design

         privacy icons

         web security, communications about

     evaluating usability of

     iterative design/develop/test

Privacy Enhancing Technologies (PETs)

privacy management, social approach to

     challenges

     deploying

     system design

     user needs, evaluating

privacy policies/preferences

     user opinion of

privacy space

     framework for, user-centric

     research

Privacy Space Framework 2nd

     validating

private keys

process, element of sociotechnical systems 2nd

     security design

product, element of sociotechnical systems 2nd

     user behavior

     user-centered design 2nd

production tasks, security system design

program advisor, ZoneAlarm

prototypes

     Chameleon interface development

     experience, interface design

     Faces

     high- and low-fidelity prototyping

     privacy policy, designing/evaluating

     user interface

         redesigning after usability evaluations

         testing

proxies, web

PSC (Problem Severity Classification Matrix) 2nd

PSN (Processor Serial Number) technology, security/privacy issues

psychological acceptability

     configuration

     passwords

     patches

     security mechanisms, context of

     user-centered design

     user-centered design of secure systems

Psychological Aspects of Communication Technologies (PACT)

public information sources for security tools

public key cryptography

     IBM Lotus Notes/Domino

     key predictability

     smart cards and

     user understanding

public keys

push-to-talk phones, exploiting plausible deniability

Категории