D


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DARPA (Defense Advanced Research Projects Agency), biometric research
DAS (Draw-a-Secret)
     graphical authentication
Defense Advanced Research Projects Agency (DARPA), biometric research
Déjà Vu
DELETE command/Delete key, Windows 2nd
     backups
Delphi method, validating Privacy Space Framework
Department of Defense sanitization standards
depth of processing, authentication memorability
design
     for usability
     phase, product development
         results of data analysis
designation, security by
designing secure systems 2nd 3rd 4th
     actual security versus theoretical 2nd
     biometric authentication
     challenges 2nd
     checklist
     conceptual approach
     Groove Virtual Office
     HCI methods/usability 2nd
     hybrid approaches
     informed consent by
     Internet, building secure
     minimizing user effort
     Mozilla Firefox
     PKIs
     privacy management systems
     social practice, supporting 2nd
     system requirements
     trust issues
     ubiquitous computing
     user accommodation
     user customization
     user goal orientation
     user privacy concerns
     user walkthroughs
     user-centered
     value-sensitive
     with challenge questions
desktop security
detection features, step in privacy process
detection tools
Dey, Anind K.
DHT (distributed hash tables)
dictionary attacks 2nd
Diffie-Hellman/DSS algorithms
digital rights management, keystroke biometrics
digital signatures
     on patches
     PGP v5.0
Dingledine, Roger
directly addressable user data
Disappearing Ink
disclosure
     ambiguous
     authentication security
     function, cell phones
     function, portable devices
     informed consent model
     user awareness and
distributed hash tables (DHT)
Document Object Model (DOM), Bugnosis architecture and
Dodgeball.com web site, privacy regulation, integrating
DOM (Document Object Model), Bugnosis architecture and
domain names, phishing attacks and
Domino applications
DOS 5.0, UNFORMAT utility
DoubleClick, Inc.
dual-code theory, picture effect
Durfee, Glenn



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net