Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Security Protection of Research Sensitive Data Based on Blockchain
Submitted by grigby1 on Thu, 09/07/2023 - 2:59pm
Access Control
extensibility
controlled sharing
blockchains
smart contracts
data structures
composability
data encryption
process control
Logic gates
sensitive data
intellectual property
Resiliency
resilience
policy-based governance
pubcrawl
security
biblio
Access Control Audit and Traceability Forensics Technology Based on Blockchain
Submitted by grigby1 on Fri, 09/01/2023 - 2:20pm
metadata
security audit
Human Factors
blockchains
information forensics
Secure storage
Forensics
Access Control
maintenance engineering
computer security
blockchain
Big Data
authorization
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Access Control Supported by Information Service Entity in Named Data Networking
Submitted by grigby1 on Fri, 08/25/2023 - 10:00am
pubcrawl
resilience
Resiliency
Scalability
Access Control
named data networking
Information Centric Networks
Information services
simulation
identity-based cryptography
Resists
Pollution
Identity-based encryption
information-centric networking
information service entity
biblio
Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks
Submitted by grigby1 on Fri, 08/25/2023 - 9:59am
computer architecture
pubcrawl
resilience
Resiliency
Scalability
authentication
5G mobile communication
Access Control
Protocols
Information Centric Networks
computer networks
information-centric networking
biblio
Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 10:30am
Aerospace electronics
Human Factors
Metrics
resilience
Resiliency
Scalability
Access Control
Cryptography
Computer crime
Cloud Security
Human behavior
Homomorphic encryption
Data protection
RKHEA
SKA
Cloud Computing
information security
cyber security
pubcrawl
biblio
ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage
Submitted by grigby1 on Fri, 06/16/2023 - 2:56pm
Access Control
assured data deletion
Cloud Computing
cloud storage
Conferences
data deletion
encryption
Memory
Performance analysis
pubcrawl
Scalability
time-sensitive data
biblio
A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM
Submitted by grigby1 on Fri, 05/19/2023 - 1:06pm
Data Security
verifiable
cloud-chain fusion
auditable
blockchains
SWIM
Multi-authority
outsourcing
CP-ABE
pubcrawl
Decision Making
Industries
Access Control
Scalability
performance evaluation
collaboration
policy-based governance
biblio
A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE
Submitted by grigby1 on Fri, 05/19/2023 - 1:05pm
Peer-to-peer computing
pubcrawl
policy-based governance
collaboration
Scalability
Data models
Access Control
Computational modeling
Data Security
edge computing
Time-frequency Analysis
Processor scheduling
CP-ABE
Ciphertext policy attribute-based encryption
cross-domain
data security sharing
biblio
Access Control Mechanism Based on Game Theory in the Internet of Things Environment
Submitted by grigby1 on Fri, 05/12/2023 - 9:16am
Games
Behavioral sciences
Resiliency
Control Theory
Regulators
trust value
Nash Equilibrium
game theory
Dynamic scheduling
Internet of Things
Access Control
Scalability
security
resilience
Human Factors
Human behavior
pubcrawl
biblio
Implement Security Analysis of Access Control Policy Based on Constraint by SMT
Submitted by grigby1 on Fri, 05/12/2023 - 9:15am
Scalability
satisfiability modulo theories
policy analysis
Resiliency
Control Theory
Transforms
Semantics
ABAC
Access Control
information security
Analytical models
security
performance evaluation
Conferences
resilience
Human Factors
Human behavior
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »