W


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

W3C (World Wide Web Consortium), P3P specifications 2nd
wallets
war driving
weakest link property 2nd 3rd
Web
     authentication and
     password hashing
     proxies
web browsers
     cookies 2nd
         handling, browser redesign
         managing
     helper objects, Privacy Bird implementation
     informed consent, gatekeepers to
         browser redesign
     interaction design, informing users through
     lock icon on, user understanding of
     peripheral awareness systems
     phishing attacks, defending against
     remote software installation
     secure communications between
     secure connections, indicating
     user tracking
web bugs 2nd
     clickstream tracking, enabling
     detecting in Bugnosis
     exoinformation example
     in Bugnosis, definition of
Web Caller-ID antiphishing tool
web forums, user feedback
web logs
     clickstreams
web mail system, Google Gmail
web security
     ambiguous disclosure forms
     communications about, P3P user agent design 2nd
     keystroke biometrics
     Mozilla Firefox
     MyDoom virus, scanning logs for
     password selection, restricting
     scanning logs
     user awareness, Bugnosis and
     user understanding of 2nd
web servers
     as certificate authorities
     secure communications between
web sites
     Barbi, violating informed consent principles
     clickstreams, logging
     credibility assessments
     fake password prompts
     forged 2nd 3rd
     low-fi prototyping
     mirror
     online banking example
     P3P policies, human-readable version
     password selection, existing advice on
     pop-ups, Bugnosis design
     trusted designs 2nd 3rd
         examples
         influence of time
     underground, attackers using
Whitten, Alma
Wilkerson, Matt
WindowBox project, Chameleon and
Windows 2000
     cipher utility
Windows systems
     cipher utility
     drag-and-drop installation, adopting
     email access, securing
     file access, securing
     file extensions, hidden
     hotkeys, designating reserved
     overwriting data and
     P3P user agents on
     software installation/removal
     viruses/worms
Windows XP
     ActiveX dialogs
     cipher utility
     Service Pack 2
         Bugnosis architecture and
         case study of
         pop-up blocking
wireless networks
     PKI and 2nd
     war driving
Wizard of Oz study
work group applications, securing with iPKIs
World Wide Web Consortium (W3C), P3P specifications 2nd
worms
Wu, Min



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net