Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] IBM Lotus Notes/Domino product suite public key security in security displays identification authentication process 2nd biometric authentication 2nd 3rd keystroke authentication applications cookies and cues, spoofing unique, with referrers/third-party cookies user-assigned identifiers identity certificates theft informance, interface design information about users, collecting/analyzing with online tools ease of finding, as influence on trust flow of avoid obscuring coarse-grained control 2nd mental models of personal as exoinformation handling, communicating policies user control user control, automated tools user control, nuances of 2nd processing by users public sources for security tools publicizing, concerns about sensitive, on discarded hard drives systems, informed consent model Information Society Technology Programme (ISTAG) informed consent browsers as gatekeepers to browser redesign by design cookie handling, browser redesign model for information systems scope of instant messaging disclosure function halting/resuming exploiting plausible deniability security administrators, communications among symmetric design, supporting information flow Instant Trust Infrastructure (ITI) integrity, trustworthiness and Intel Pentium III processor, security/privacy issues interface as trust factor design adaptive systems clustering users information visualization principles 2nd 3rd PGP v5.0 ubiquitous computing user accommodation user customization user privacy concerns validation of error in Mac OS 10.3 HCI and prototypes psychological manipulation of users simplicity and socially aware style guide testing design/usability of International Security, Trust & Privacy Alliance (ISTPA) Privacy Framework Internet online banking example secure, building multi-ring high-security environment trust and design examples viruses/worms Internet Explorer consent dialogs extensibility of, Bugnosis user interface file download dialogs remote software installation SpoofGuard spoofing identification cues version 5, Privacy Bird add-on version 6 P3P functionality in Privacy Bird add-on interprocess communication, Chameleon intrusion detection systems 2nd IP addresses checking for MyDoom virus phishing attacks and iPKIs (instant PKIs) 2nd certificate authorities and Network-in-a-Box securing work group applications web servers as certificate authorities iris verification, biometrics authentication ISTAG (Information Society Technology Programme) ISTPA (International Security, Trust & Privacy Alliance) Privacy Framework ITI (Instant Trust Infrastructure) |