C


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

CapDesk research project
capture, biometric authentication
Cascading Style Sheets (CSS)
case studies
     anonymizing networks
         Mixminion
     Casca, work group applications, iPKIs and
     Chameleon interface development
     Faces software prototype
     JAP
     KaZaA user study
     network intrusion alert
     Network-in-a-Box
     PGP v5.0
     PKI deployment for wireless networks
     privacy policy management tool
     privacy, designing for
     security administration
     security application, usability of
     sensitive information on discarded drives
     SpoofGuard
     Tor
     Web, usable access control for
     Windows XP Service Pack 2
CDNs (content distribution networks)
cell phones
     context-aware
     disclosure function 2nd
     disposable
     exploiting plausible deniability
CERT (Computer Emergency Readiness Team)
certificate authorities, iPKIs and
challenge questions systems
     criteria for building/evaluating
     designing
Chameleon
     email attachments, security and
     interface
         development
         X Windows implementation
     low-fidelity prototyping
     network access
     roles
     simplicity of interface
     usability/security
chat rooms, security administrators, communications among
chattr command (Linux)
Children Online Privacy Protection Act (COPPA)
cipher utility (Windows)
classification, biometric authentication
clickstreams
     tracking, web bugs enabling
code samples, as vulnerability detection tool 2nd
coercion
Coffetti, Paolo
cognitive walkthrough, usability technique
     KaZaA user study, results of
     PGP v5.0
collection limitation, privacy criterion for challenge questions system
communications
     Chameleon 2nd
     secure interaction design
     security administrators, coordinating efforts of 2nd
community, sense of, trust design
Compatible Time Sharing System (CTSS)
competence, informed consent model
comprehension, informed consent model
Computer Emergency Readiness Team (CERT)
Confab system
confidentiality
     authentication security
configuration
     detecting changes in
     gesture-based approach to
     iPKIs and
     KaZaA user study
     options, Privacy Bird
     privacy system design, emphasizing user action
consent dialogs, trust issues and
content distribution networks (CDNs)
contextual design
controlled answers/questions, challenge questions
convenience, authentication accessibility
Cookie-Watcher application
cookies 2nd 3rd
     adware and
     as hidden tracking devices
     blocking
     development of
     handling, informed consent
     just-in-time interventions
     managing
         Privacy Bird and
         supporting information flow
         with Acumen
     security by designation
     third-party
     web site practices, P3P compact policies
COPPA (Children Online Privacy Protection Act)
cost to user (CUE)
cost to user to authenticate (CUA)
cost, authentication evaluation criterion
     CUA/CUE, keystroke biometrics
     environmental considerations
     online banking example
Coventry, Lynne
cracking attacks
     crackability, authentication security
     frequent login attempts and
Cranor, Lorrie Faith
credentials, recovering with challenge questions
criteria for evaluating/selecting authentication
     accessibility
     biometric systems
     challenge question systems
     cost
     memorability
     security
     trustworthiness of technology
     usability
         portable devices
         smart cards/USB tokens
cryptography
     keystroke biometrics
CSCW (Computer-Supported Cooperative Work) 2nd
     privacy issues
CSI/FBI Computer Crime and Security Survey
CSS (Cascading Style Sheets)
CTSS (Compatible Time Sharing System)
CUA (cost to user to authenticate)
CUE (cost to user)
cued recall 2nd
cultural passwords
     abundance of
     cued recall
     inclusivity
     meaningfulness of
Cypherpunk networks



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net