I


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

IBM Lotus Notes/Domino
     product suite
     public key security in
     security displays
identification
     authentication process 2nd
     biometric authentication 2nd 3rd
         keystroke authentication applications
     cookies and
     cues, spoofing
     unique, with referrers/third-party cookies
     user-assigned identifiers
identity
     certificates
     theft
informance, interface design
information
     about users, collecting/analyzing with online tools
     ease of finding, as influence on trust
     flow of
         avoid obscuring
         coarse-grained control 2nd
         mental models of
     personal
         as exoinformation
         handling, communicating policies
         user control
         user control, automated tools
         user control, nuances of 2nd
     processing by users
     public sources for security tools
     publicizing, concerns about
     sensitive, on discarded hard drives
     systems, informed consent model
Information Society Technology Programme (ISTAG)
informed consent
     browsers as gatekeepers to
         browser redesign
     by design
     cookie handling, browser redesign
     model for information systems
     scope of
instant messaging
     disclosure function
         halting/resuming
     exploiting plausible deniability
     security administrators, communications among
     symmetric design, supporting information flow
Instant Trust Infrastructure (ITI)
integrity, trustworthiness and
Intel Pentium III processor, security/privacy issues
interface
     as trust factor
     design
         adaptive systems
         clustering users
         information visualization principles 2nd 3rd
         PGP v5.0
         ubiquitous computing
         user accommodation
         user customization
         user privacy concerns
         validation of
     error in Mac OS 10.3
     HCI and
     prototypes
     psychological manipulation of users
     simplicity and
     socially aware
     style guide
     testing design/usability of
International Security, Trust & Privacy Alliance (ISTPA) Privacy Framework
Internet
     online banking example
     secure, building
         multi-ring high-security environment
     trust and
         design examples
     viruses/worms
Internet Explorer
     consent dialogs
     extensibility of, Bugnosis user interface
     file download dialogs
     remote software installation
     SpoofGuard
     spoofing identification cues
     version 5, Privacy Bird add-on
    version 6
         P3P functionality in
         Privacy Bird add-on
interprocess communication, Chameleon
intrusion detection systems 2nd
IP addresses
     checking for MyDoom virus
     phishing attacks and
iPKIs (instant PKIs) 2nd
     certificate authorities and
     Network-in-a-Box
     securing work group applications
     web servers as certificate authorities
iris verification, biometrics authentication
ISTAG (Information Society Technology Programme)
ISTPA (International Security, Trust & Privacy Alliance) Privacy Framework
ITI (Instant Trust Infrastructure)



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net