Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
An Integrated Safety Management System Based on Ubiquitous Internet of Things in Electricity for Smart Pumped-storage Power Stations
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
pumped-storage power stations
data transmission layer
emergency broadcasting
fall protection module
geological warning module
Integrated
integrated safety management system
ISMS
personnel location module
data processing layer
Safety management
security monitoring module
smart pumped-storage power station
smart pumped-storage power stations
ubiquitous Internet of Things
ubiquitous internet of things in electricity
unified information platform
Ubiquitous Computing Security
Safety
Scalability
Servers
Access Control
Internet of Things
Resiliency
pubcrawl
Metrics
power engineering computing
Monitoring
Human Factors
security monitoring
Personnel
central control module
communication module
data acquisition layer
data display layer
data manipulation layer
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Risk-Based Attributed Access Control Modelling in a Health Platform: Results from Project CityZen
Submitted by grigby1 on Mon, 01/27/2020 - 11:33am
privacy
trust
supply chain risk assessment
security
Scalability
Risk
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Metrics
Identification
Human Factors
Human behavior
composability
collaboration
authentication
biblio
An Efficient Date-Constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System
Submitted by grigby1 on Mon, 01/27/2020 - 11:26am
Access Control
Date-constraint
E-medicine system
Elliptic Curve Cryptosystem
Human behavior
Human Factors
key management
Metrics
mobile agent
pubcrawl
resilience
Resiliency
Scalability
biblio
DTE Access Control Model for Integrated ICS Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Industrial Control Systems Anomaly Detection
Access Control
Domain and Type Enforcement
DTE Firewall
Industrial Control Systems
pubcrawl
resilience
Resiliency
Scalability
security policy
Segregation
biblio
Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
Access Control
Australia
authentication
authorisation
constrained IoT resources
Human behavior
Identity management
Internet of Things
Medical services
mobile wearable devices
Protocols
pubcrawl
resilience
Scalability
smart sensors
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy
Submitted by aekwall on Mon, 01/20/2020 - 11:14am
location-based services
zero trust
user privacy in the cloud
user location data
third-party application
supplementary servers
Scalability
Resiliency
pubcrawl
policy-based governance
mobile computing
Metrics
Access Control
location information
LBSs
Human Factors
dynamic multilevel policy
data privacy protection
data privacy
data partitioning
cloud-based locations
cloud service
Cloud Computing
authorisation
biblio
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
IDS
shared key encryption
Servers
response scheme
response ability
Resiliency
network intrusion detection system
intrusion response system
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
Internet of Things
pubcrawl
group encryption
encryption
Cryptography
CP-ABE-encrypted IoT networks
CP-ABE
computer architecture
composability
ciphertext-policy
attribute-based encryption
anomaly-based detection engines
Access Control
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »