Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] CapDesk research project capture, biometric authentication Cascading Style Sheets (CSS) case studies anonymizing networks Mixminion Casca, work group applications, iPKIs and Chameleon interface development Faces software prototype JAP KaZaA user study network intrusion alert Network-in-a-Box PGP v5.0 PKI deployment for wireless networks privacy policy management tool privacy, designing for security administration security application, usability of sensitive information on discarded drives SpoofGuard Tor Web, usable access control for Windows XP Service Pack 2 CDNs (content distribution networks) cell phones context-aware disclosure function 2nd disposable exploiting plausible deniability CERT (Computer Emergency Readiness Team) certificate authorities, iPKIs and challenge questions systems criteria for building/evaluating designing Chameleon email attachments, security and interface development X Windows implementation low-fidelity prototyping network access roles simplicity of interface usability/security chat rooms, security administrators, communications among chattr command (Linux) Children Online Privacy Protection Act (COPPA) cipher utility (Windows) classification, biometric authentication clickstreams tracking, web bugs enabling code samples, as vulnerability detection tool 2nd coercion Coffetti, Paolo cognitive walkthrough, usability technique KaZaA user study, results of PGP v5.0 collection limitation, privacy criterion for challenge questions system communications Chameleon 2nd secure interaction design security administrators, coordinating efforts of 2nd community, sense of, trust design Compatible Time Sharing System (CTSS) competence, informed consent model comprehension, informed consent model Computer Emergency Readiness Team (CERT) Confab system confidentiality authentication security configuration detecting changes in gesture-based approach to iPKIs and KaZaA user study options, Privacy Bird privacy system design, emphasizing user action consent dialogs, trust issues and content distribution networks (CDNs) contextual design controlled answers/questions, challenge questions convenience, authentication accessibility Cookie-Watcher application cookies 2nd 3rd adware and as hidden tracking devices blocking development of handling, informed consent just-in-time interventions managing Privacy Bird and supporting information flow with Acumen security by designation third-party web site practices, P3P compact policies COPPA (Children Online Privacy Protection Act) cost to user (CUE) cost to user to authenticate (CUA) cost, authentication evaluation criterion CUA/CUE, keystroke biometrics environmental considerations online banking example Coventry, Lynne cracking attacks crackability, authentication security frequent login attempts and Cranor, Lorrie Faith credentials, recovering with challenge questions criteria for evaluating/selecting authentication accessibility biometric systems challenge question systems cost memorability security trustworthiness of technology usability portable devices smart cards/USB tokens cryptography keystroke biometrics CSCW (Computer-Supported Cooperative Work) 2nd privacy issues CSI/FBI Computer Crime and Security Survey CSS (Cascading Style Sheets) CTSS (Compatible Time Sharing System) CUA (cost to user to authenticate) CUE (cost to user) cued recall 2nd cultural passwords abundance of cued recall inclusivity meaningfulness of Cypherpunk networks |