Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Blockchain-Based Secure Collaboration Platform for Sharing and Accessing Scientific Research Data
Submitted by grigby1 on Tue, 04/27/2021 - 11:31am
Human behavior
smart contracts
Secure File Sharing
Resiliency
resilience
pubcrawl
Permission
Metrics
Hyperledger Fabric
Access Control
data privacy
data management
Cryptography
composability
collaboration
blockchain
attribute-based encryption
biblio
The EGRBAC Model for Smart Home IoT
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
home automation
smart houses
smart home IoT
extended generalized role based access control model
EGRBAC model
AWS-IoT Greengrass
RBAC
Information Reuse and Security
Context modeling
Compositionality
authorisation
Smart homes
Computational modeling
pubcrawl
Resiliency
Adaptation models
smart devices
Internet of Things
Access Control
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Re-encrypted Data Access Control Scheme Based on Blockchain
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
Cloud Computing
Access Control
encryption
Proxy re-encryption
Resiliency
pubcrawl
privacy
blockchain
Aerospace electronics
expandability
Compositionality
privacy protection
Thermal stability
RBAC
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
Secure Biometric Lock System for Files and Applications: A Review
Submitted by aekwall on Tue, 03/09/2021 - 10:55am
fingerprint identification
user access information
Software
security system
secure biometric lock system
Scalability
Resiliency
pubcrawl
multifactor authentication
Metrics
Fingers
Fingerprint recognition
biometric encryption
fingerprint biometric systems
finger recognition
Face
encryption algorithms
Cryptography
biometrics (access control)
biometric system
biometric fingerprint sensor
authorisation
authentication
Access Control
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »