Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Blockchain-Assisted Information Distribution for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Access Control
authentication
composability
Compositionality
contracts
Human behavior
Human Factors
Identity management
internet
Metrics
Provenance
provenance verification
pubcrawl
Public key
Resiliency
sensors
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
Security policy transition framework for Software Defined networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
Software Defined Networks
software defined networking
Software
Security Policy Transitions
security policy transition framework
security policies
SDN environments
SDN
Ryuretic
RYU
pubcrawl
programming frameworks
Ports (Computers)
policy-based governance
Access Control
NOS
Network Security Policies
network operating system
network application development
Network Access Control
NAC
Monitoring
Kinetic theory
Government
Governance
external command
computer network security
collaboration
biblio
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Access Control
composability
Permission
pubcrawl
Resiliency
sandbox
sandboxing
Trusted Execution Environment
trusted platform modules
biblio
A Distributed Graph Database for the Data Management of IoT Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
graph edge property
social computing
security
REST API
Resiliency
pubcrawl
middleware
IoT systems
IoT
Internet of Things
green computing
graph theory
Access Control
graph database operations
graph database
distributed system
distributed graph database
Distributed databases
data management
Conferences
composability
collaboration
application program interfaces
access protocol permissions
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation
biblio
An In-Depth Study of More Than Ten Years of Java Exploitation
Submitted by K_Hooper on Wed, 11/01/2017 - 11:04am
Security analysis
Scalability
resilience
pubcrawl
java security
Human behavior
exploits
Attack vectors
Access Control
biblio
Policy Negotiation for Co-owned Resources in Relationship-Based Access Control
Submitted by K_Hooper on Fri, 10/13/2017 - 10:23am
Access Control
availability criteria
Computer Theory and Trust
Computing Theory
Human behavior
interactive policy negotiation
multiple ownership
organizational computing
polynomial hierarchy.
privacy preference
pubcrawl
rebac
sat solver
sharing need
trust
biblio
Access-Controlled In-Network Processing of Named Data
Submitted by grigby1 on Tue, 10/10/2017 - 10:58am
Access Control
content centric networking
in-network computation
information centric networking
Information Centric Networks
named data networking
named function networking
privacy
pubcrawl
Resiliency
Scalability
security
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »