T


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

TANs (transaction authorization numbers) approach to online banking authentication mechanism
tap regions, graphical authentication
tasks
     analysis of
     core, scenarios
         validated/updated
     ease of use, influence of
     flow, validated user model
     privacy implications, user understanding of
     production versus supporting
     varying security with
testing
     benchmark studies, setting usability goals
     design/usability of user interface
     empirical usability laboratory studies
     exploits on isolated systems
     security mechanisms
     usability
     user-interface prototypes
The Anonymizer
third-party cookies
threat analysis
Thunderwire, CSCW research study
TLS (Transport Layer Security)
Tognazzini, Bruce "Tog"
tokens
     authentication based on 2nd
     biometric verification and
     P3P compact policy
tools
     antiphishing
     automated, user control of personal information
     awareness/detection
     Bugnosis
     code samples, vulnerability detection 2nd
     communications, coordinating security administrator efforts
     disk repair utilities, securing file access
     file/host integrity
     for finding patches
     for security administration
     forensic
     hacking
     honeypots
     HTTP logs
     information management
     integration of, need for
    monitoring
         analyzing network logs 2nd
         networks in real time
     MOO 2nd 3rd
     network intrusion alert, case study
     privacy awareness, Bugnosis future directions
     public information sources for
     recognizing/removing adware/spyware
     remote data collection/system evaluation
     rootkit hunters 2nd
     scanning 2nd 3rd
         web logs
     search utilities, file access security
     session logs
     trapping hackers
     visualization
Tor networks
transaction authorization numbers (TANs) approach to online banking authentication mechanism
transitive trust
Transport Layer Security (TLS)
Trash Can icon, user interface error in Mac OS 10.3
Tresor 2.2
Tribe.net web site, user-controlled information flow
Trojan horses, patch distribution and
trust 2nd 3rd
     authentication and
     beliefs about trustworthiness
     context of
     credibility and 2nd
     decisions about, user control of
     designs promoting
         examples
     disposition to
     exploiting, phishing attacks and
     hard trust/soft trust
     informed consent and
     layers of
     models of
         iPKIs and
     on eBay
     personal information handling, communicating policies
     situational
     Solaris trusted stripe
     time-course of
     transitive
     user-generated keys and
     users and
trust-risk relationship
     e-commerce transactions
     high risk/low trust model
     technology factors
two-factor authentication
Tygar, Doug
Type I networks
typing verification, keystroke biometrics



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net