Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 9:13am
Security Metrics
security policies generation
policy basedsecurity management
generative policy based system
administrative overhead
Manuals
complex systems
security policies
security management
computer network security
Measurement
computer security
Grammar
policy-based governance
pubcrawl
computer network management
Access Control
authorisation
biblio
Two Methods for Authentication Using Variable Transmission Power Patterns
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
pattern locks
Human behavior
Scalability
Resiliency
Access Control
authentication
Communication system security
Hardware
Mathematical model
power control
pubcrawl
Relays
source authentication
variable power
wireless authentication
Wireless communication
biblio
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
privacy-respecting Deep Packet Inspection
network payloads
organizational policies
passive proxying
Perfect Forward Secrecy
policy based framework
privacy
Privacy Policies
Privacy Requirements
privacy-aware techniques
Network connections
pubcrawl
Scalability
security solutions
semantic technologies
telecommunication traffic
TLS 1.3
unencrypted payloads
user access privileges
decryption
access decision
active proxying
attribute based access control
Attribute-based Access Control (ABAC)
big-data problem
computer network security
critical requirement
Cryptography
data privacy
Access Control
deep packet inspection
DPI analysis
DPI tools
fully encrypted data-transfer
high velocity network traffic
Human behavior
internet
malicious activity
biblio
Contextual permission models for better privacy protection
Submitted by Heather Lucas on Tue, 03/31/2020 - 10:29am
Access Control
machine learning
Mobile Permissions
permission models
privacy
security
Usable Security
user study
Policy-Governed Secure Collaboration
Scalability and Composability
Security Metrics Driven Evaluation, Design, Development, and Deployment
Understanding and Accounting for Human Behavior
ICSI
Human Behavior
Metrics
Policy-Governed Secure Collaboration
Scalability and Composability
Operationalizing Contextual Data
biblio
SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT
Submitted by grigby1 on Wed, 03/18/2020 - 11:28am
pubcrawl
Internet of Things
LiBAC
Light-Weight Cryptography
lightweight break-glass access control
medical information systems
medical records
patient care
patients care
private key cryptography
information retrieval
reduced computational complexity
resilience
Resiliency
secret key generation time
Secure File Sharing
secure information retrieval using lightweight cryptography
SIRLC
therapeutic records
encryption
access permission
attribute based key
Attribute based Key Management
authorisation
authoritative entities
cipher text size
Emergency care
emergency key
emergency supporting representatives
Access Control
enhanced security
ESR
Generators
health care
healthcare Internet of things
HIoT
hospitals
Identity management
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
biblio
Data Management in Supply Chain Using Blockchain: Challenges and a Case Study
Submitted by grigby1 on Thu, 03/12/2020 - 11:08am
information retrieval
supply chains
supply chain security
supply chain management
Stakeholders
social benefits
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
product tracing
Logistics
Access Control
Industries
Human behavior
financial management
financial benefits
environmental benefits
Distributed databases
data retrieval
data management
cryptocurrencies
blockchain-based SCM systems
blockchain-based food traceability system
blockchain
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »