Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

W3C (World Wide Web Consortium), P3P specifications 2nd

wallets

war driving

weakest link property 2nd 3rd

Web

     authentication and

     password hashing

     proxies

web browsers

     cookies 2nd

         handling, browser redesign

         managing

     helper objects, Privacy Bird implementation

     informed consent, gatekeepers to

         browser redesign

     interaction design, informing users through

     lock icon on, user understanding of

     peripheral awareness systems

     phishing attacks, defending against

     remote software installation

     secure communications between

     secure connections, indicating

     user tracking

web bugs 2nd

     clickstream tracking, enabling

     detecting in Bugnosis

     exoinformation example

     in Bugnosis, definition of

Web Caller-ID antiphishing tool

web forums, user feedback

web logs

     clickstreams

web mail system, Google Gmail

web security

     ambiguous disclosure forms

     communications about, P3P user agent design 2nd

     keystroke biometrics

     Mozilla Firefox

     MyDoom virus, scanning logs for

     password selection, restricting

     scanning logs

     user awareness, Bugnosis and

     user understanding of 2nd

web servers

     as certificate authorities

     secure communications between

web sites

     Barbi, violating informed consent principles

     clickstreams, logging

     credibility assessments

     fake password prompts

     forged 2nd 3rd

     low-fi prototyping

     mirror

     online banking example

     P3P policies, human-readable version

     password selection, existing advice on

     pop-ups, Bugnosis design

     trusted designs 2nd 3rd

         examples

         influence of time

     underground, attackers using

Whitten, Alma

Wilkerson, Matt

WindowBox project, Chameleon and

Windows 2000

     cipher utility

Windows systems

     cipher utility

     drag-and-drop installation, adopting

     email access, securing

     file access, securing

     file extensions, hidden

     hotkeys, designating reserved

     overwriting data and

     P3P user agents on

     software installation/removal

     viruses/worms

Windows XP

     ActiveX dialogs

     cipher utility

     Service Pack 2

         Bugnosis architecture and

         case study of

         pop-up blocking

wireless networks

     PKI and 2nd

     war driving

Wizard of Oz study

work group applications, securing with iPKIs

World Wide Web Consortium (W3C), P3P specifications 2nd

worms

Wu, Min

Категории