Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Protecting the long tail: Transparent packet security in content-centric networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
Access Control
data privacy
encryption
Network Security Architecture
privacy
Protocols
pubcrawl
resilience
Resiliency
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
encryption
trustworthy access control
trusted platform modules
Trusted Computing
storage management
semantically rich access control system
robust access control
Resiliency
pubcrawl
OWL
Organizations
organization confidentiality policies
Ontologies
Oblivious Storage
end-to-end oblivious data transaction
Access Broker
document security
document handling
data threats
Confidentiality Policy
Computational modeling
composability
cloud storage security
cloud service platform
Cloud Computing
business data processing
authorisation
Access Control
access broker module
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
rights management system
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
internet
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
Access Control
Human Factors
Human behavior
hardware-software collaboration
Hardware
groupware
eTRON architecture
digital token
Digital rights management
Cryptography
computer architecture
authorisation
authentication
asymmetric cryptography
APIs
API
biblio
Multi-Level Security for the 5G/IoT Ubiquitous Network
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Internet of Things
Ubiquitous Computing Security
Transaction Data
Temperature measurement
security model
Scalability
Resiliency
pubcrawl
network domain
network bandwidth
multilevel security model
Multi-Level Security
Metrics
IoT
5G
information security domain
Human Factors
Human behavior
fifth-generation mobile communication networks
Context modeling
Context
computer network security
Computational modeling
BLP
Access Control
5G-IoT ubiquitous network
5G mobile communication
biblio
A Multi-Level Security Access Control Framework for Cross-Domain Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
Ubiquitous Computing Security
target domain
simulation
secure interactions
Scalability
Resiliency
pubcrawl
Organizations
network domains
multilevel security protection
multilevel security access control framework
multilevel mapping method
Multi-Level Security
Access Control
mapping method
intradomains
inter-domain mapping
information science
Human Factors
Human behavior
hierarchical access control structures
Data protection
cross-domain networks
cross-domain
Conferences
Computational modeling
authorisation
biblio
Attribute-Based Proxy Re-Encryption Method for Revocation in Cloud Data Storage
Submitted by grigby1 on Tue, 02/06/2018 - 1:46pm
Access Control
Attribute-Based Encryption (ABE)
big data security in the cloud
Cloud Computing
cloud storage
encryption
Metrics
Proxy re-encryption
pubcrawl
Resiliency
Scalability
Servers
Time measurement
biblio
Big Data Source Location Privacy and Access Control in the Framework of IoT
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
IoT
Servers
security
Scalability
Resiliency
pubcrawl
Protocols
privacy
Policy
mobile devices
Metrics
location
Access Control
Internet of Things
Human Factors
generator objects
encryption
data privacy
Data models
Cryptography
big data source location privacy
big data privacy
Big Data
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »