Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 4:03pm
encryption
pubcrawl
Metrics
Resiliency
data privacy
Access Control
Smart Grid
Smart Grids
Scalability
attribute-based encryption
outsourcing
Costs
data access control
computation outsourcing
Smart Grid Privacy
biblio
Research on Data Security and Privacy Protection of Smart Grid Based on Alliance Chain
Submitted by grigby1 on Fri, 01/20/2023 - 3:59pm
security
pubcrawl
Metrics
Resiliency
Safety
data privacy
Access Control
process control
smart meters
Smart Grids
Blockchain technology.
Paillier homomorphic encryption algorithm.
Role-Based access control policy.
Smart grid.
Smart Grid Privacy
biblio
Auditing a Software-Defined Cross Domain Solution Architecture
Submitted by grigby1 on Fri, 01/06/2023 - 3:05pm
Access Control
trusted systems
Cross Domain Solution
Configuration Security
Architecture Description Language
trustworthiness
Security analysis
Data protection
Trusted Computing
Mission critical systems
Air gaps
computer architecture
composability
Computational modeling
Data models
Hardware
Software
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 5:29pm
composability
Wireless communication
security
secure group communication
resilience
Receivers
Protocols
performance evaluation
Optimized production technology
mobile ad-hoc networks
key management
authentication
Ad hoc networks
Ad Hoc Network Security
Access Control
Human behavior
Metrics
Resiliency
Scalability
pubcrawl
biblio
Research on iOS Remote Security Access Technology Based on Zero Trust
Submitted by grigby1 on Fri, 12/02/2022 - 10:10am
mechatronics
zero trust
Teleworking
ShangMi (SM) cryptographic algorithms
Resiliency
resilience
pubcrawl
Prototypes
process control
Acoustic Fingerprints
information security
identity authentication
Human Factors
Human behavior
Epidemics
computer architecture
composability
Access Control
biblio
About the System of Profiling User Actions Based on the Behavior Model
Submitted by grigby1 on Thu, 10/20/2022 - 2:16pm
Windows Operating System Security
UBA
profiling
internal attacker
behavior analysis
Resiliency
Workstations
File systems
service-oriented architecture
pubcrawl
operating systems
control systems
composability
Prototypes
Access Control
resilience
Metrics
biblio
A Dynamic Access Control Model Based on Game Theory for the Cloud
Submitted by aekwall on Sun, 10/16/2022 - 5:03pm
pubcrawl
game theoretic security
Nash Equilibrium
dynamic
Cloud Computing
Predictive Metrics
Access Control
game theory
Scalability
Measurement
Games
Conferences
probability
authorization
trust
Human Factors
Computational modeling
biblio
Self-Sovereign Identity creation on Blockchain using Identity based Encryption
Submitted by aekwall on Fri, 09/30/2022 - 1:40pm
blockchain
privacy
data privacy
Scalability
Access Control
pubcrawl
Resiliency
Human behavior
data integrity
decentralized
maintenance engineering
Identity management
Identity-based encryption
user-centric
biblio
Fine Grained Confinement of Untrusted Third-Party Applications in Android
Submitted by grigby1 on Fri, 08/26/2022 - 12:28pm
Mobile Applications
Third Party Applications
SE-Android
Internet telephony
AOSP
Mobile Security
confinement
spyware
Intelligent systems
cyber security
smart phones
composability
Access Control
privacy
performance evaluation
Resiliency
resilience
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »