Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

random passwords

     authentication time

     centrally assigned

     meaningfulness of

     memorability of

     predictability of

Rapid Assessment tool, Groove Virtual Office

recall

     knowledge-based authentication keys

     uncued/cued

recognition

     authentication mechanism based on

         inclusivity

     picture effect, graphical passwords and

     retrieval strategy for graphical passwords

recovery, step in privacy process

Reiter, Michael

Renaud, Karen

repeatability, challenge questions system

reputation systems, trust design element

requirements phase, product development

research-based attacks

response, step in privacy process

retina verification, biometrics authentication

retrieval strategies, memorability and

return on investment (ROI) analysis, case study of security application

rings, multiple, security model for Internet

risks

     managing, decision-making process and

     risk and threat analysis

ROI (return on investment) analysis, case study of security application

rootkits

     hunting

Ross, Blake

Категории