Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
PACMAN: Personal Agent for Access Control in Social Media
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personal agent
standards
social networking (online)
social media
social context
Social Agents
Scalability
recommender systems
pubcrawl
privacy
personalized access control decisions
personal assistant agent
personal agent for access control
Access Control
PACMAN
multi-agent systems
Media
machine learning
Internet/Web technologies
internet
Human Factors
Human behavior
friend network
Facebook
authorisation
appropriate audience selection
biblio
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
energy consumers
smart power grids
smart meters
Smart Grids
smart grid consumer privacy
Smart Grid
real-time usage data
pubcrawl
privacy
power engineering computing
Human Factors
fine-grained access control
fine- grained data access control
Access Control
encryption
Decision trees
data utility
data privacy preservation
data privacy
data integrity
data aggregation scheme
data aggregation
control center
authorisation
attribute decision tree
biblio
Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Gold
user collusion attacks
user authorization
user anonymity protection
user anonymity
security weaknesses
security enhancement
Resiliency
resilience
pubcrawl
policy-based governance
Outsourcing Decryption
Metrics
identity privacy
Human Factors
Human behavior
Access Control
finegrained access control
encryption
data privacy
data access privilege scheme
Cryptography
cryptanalysis
Computational modeling
collaboration
cloud data access privilege
Cloud Computing
authority collusion attacks
authorities collusion attack
authorisation
attribute-based encryption
biblio
Poster: Near Field Communication Based Access Control for Wireless Medical Devices
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
Access Control
medical devices
Near Field Communication
response time
secure pairing
1536086
biblio
Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
learning (artificial intelligence)
wireless sensor networks
wireless insulin pump system
Wireless insulin pump
Wireless communication
Universal Serial Bus
supervised learning approaches
single acute overdose
security mechanisms
regression models
regression analysis
PIPAC
patient safety
patient infusion pattern based access control schemes
Access Control
Insulin
infusion pattern
implantable medical devices
hospitals
home healthcare systems
health care
Diabetes
Communication system security
chronic overdose
bolus abnormal dosage detection
basal abnormal rate detection
authorisation
1536086
biblio
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
Access Control
Android OS
Human behavior
Permission
Policy
privacy
Privacy Policies
Privacy Policy
pubcrawl
Scalability
biblio
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing
Submitted by grigby1 on Thu, 05/24/2018 - 12:18pm
Access Control
composability
Compositionality
Control Theory
fault tolerance
information sharing
Metrics
ORCON
provable security
pubcrawl
resilience
Resiliency
security
biblio
The Authorization Policy Existence Problem
Submitted by grigby1 on Wed, 05/16/2018 - 1:44pm
Control Theory
Resiliency
Access Control
computational complexity
Computing Theory
fixed-parameter tractability
pubcrawl
resilience
satisfiability
biblio
Scalable Role-Based Data Disclosure Control for the Internet of Things
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
medical computing
Watermarking
smart health care
security
scalable role-based data disclosure control
Scalability
RFIDs
RFID
Resiliency
resilience
radio frequency identification
pubcrawl
privacy
Access Control
IoT data filtering
IoT data aggregation
Internet of Things
human factor
Human behavior
health care
Disclosure control
digital watermarking technique
data privacy
Correlation
Contextualization
Big Data
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »