Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Framework modeling for User privacy in cloud computing
Submitted by aekwall on Mon, 07/13/2020 - 10:05am
privacy framework
user privacy in the cloud
user privacy framework
Trusted Computing
trust issues
security in cloud computing
Scalability
Resiliency
pubcrawl
protection monitor
privacy issues over cloud
Access Control
privacy
Organizations
Metrics
framework modeling
encryption
Data Security
data privacy
Cryptography
Cloud Computing
authorisation
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
Implementation of Multi-level Security Domain Scheme for Embedded Computer Based on MILS Architecture
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
security domain
system crash
multiple embedded computers
multilevel security domain dynamic management
MILS architecture
MILS
migration cross partitions
hardware crash
functional failure
embedded computer
data isolation
access control lists
Access Control
security requirements
computer security
Metrics
Computational modeling
composability
pubcrawl
Resiliency
computer architecture
embedded systems
authorisation
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
nondesignated receivers
data reencryption
file transfer protocol
Formal Security Models
FTP-NDN
named data network
Named Data Networking (NDN)
NDN nodes
network flow requirement
data confidentiality
re-encryption
storage costs
TCP-IP networks
unknown potential receivers
usage amount
users
video services
Named Data Network Security
transport protocols
Scalability
Servers
telecommunication traffic
Cryptography
Access Control
Receivers
Protocols
computer architecture
computer network security
Resiliency
Human behavior
pubcrawl
internet
network traffic
ciphertext transmission
complete secure file transfer protocol
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 10:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
privacy protection
service accountability
Secure
SEAF
next-generation network
network resources
network edge
in-network cache
efficient and accountable access control framework
effective access control mechanism
delivery service
content providers
content delivery
cache-enabled routers
network accountability
cache storage
computer network security
ICN
information centric networking
delays
authentication
internet
Metrics
privacy
composability
pubcrawl
Resiliency
data privacy
Access Control
encryption
Cryptography
authorisation
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 9:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »