E


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

e-commerce transactions
     antecedents/consequences of trust for
     pre-interactional filters 2nd
     risk factors
     trust/cost as opposing factors
EAP-TLS (Extensible Authentication Protocol in TLS)
eBay
     hard disks purchased from, security of
     phishing attacks against customers
     trust issues
         design factors
email
     access to, securing
    attachments
         malware
         self-propagating
     exoinformation example
     Mixminion anonymizing network
     sanitizing, cryptographic approach to
     security administrators, communications among
     security alerts
     tracking, Bugnosis future directions
     viruses
Empty Trash command (Macintosh), replacing with Shred Trash command
encrypting
     data on backups 2nd
     email
     files
    messages
         IBM Lotus Notes/Domino
         user reluctance
     PGP v5.0, usability evaluation of
     symmetic key cryptography
enrollment
     biometric authentication 2nd
     iPKIs and
environment
     academic, persistent hacking attacks
     authentication and 2nd
     awareness of portable systems
     cultural panorama in product development
     high-security multi-ring, building Internet as
     knowledge of, system administrator requirement
     legal/regulatory, need for system design response to
     quarantined, for downloading exploits
     research, persistent hacking attacks
     security mechanisms, effective operation of
     ubicomp, privacy in
ERASE command (Windows)
ethnography, understanding user work practices
     HCI research
ettercap package
European Union privacy directive, ubicomb design guidelines
evaluating
     authentication mechanisms
         selection criteria
     biometric authentication systems
         keystroke systems, previous research
         performance
         user factors, including
     competitive systems, strengths/weaknesses
     Faces software prototype
     interface prototypes, heuristic reviews of
     PGP v5.0
     policy authoring in privacy policy management tool
     portable devices
     Privacy Bird
     privacy management systems
     privacy/security solutions
     technology, trustworthiness of
Evite social planning web site, web bug in email from
exformation
exoinformation 2nd
experience prototyping, interface design
experimental study, password selection
Extensible Authentication Protocol in TLS (EAP-TLS)
extensible markup language (XML), P3P and



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net