Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Presentation 9. Attribute assurance for attribute based access control
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Communities
subject attributes
open systems
object attributes
NIST
National security
LOAA
level of attribute assurance
interoperability
Intelligence Community Policy Guidance
ICPG
environmental attributes
Educational institutions
Department of Defense and Intelligence Community
critical assets protection
attribute retrieval
authorisation
attribute-based authorization
attribute update
attribute based access control
attribute confidentiality
attribute integrity
ABAC
Access Control
access management
AP
attribute assurance
attribute provider
attribute repositories
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
ISO/IEC/IEEE International Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Part 1AR: Secure device identity
Submitted by BrandonB on Fri, 05/01/2015 - 8:57am
Local area networks
X.509
security
secure device identifier
secure association
port-based network access control
PKI
network security
Metropolitan area networks
MANs
MAC security
Access Control
LANs
ISO standards
information technology
IEEE standards
IEC standards
certificate
authorization
authentication
Access controls
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
biblio
Security of sharded NoSQL databases: A comparative analysis
Submitted by BrandonB on Fri, 05/01/2015 - 8:30am
encryption
SQL
Sharding
sharded NoSQL databases
Servers
security of data
security features
NoSQL sharding mechanisms
NoSQL
Access Control
Distributed databases
Database Security
Data and Applications Security
Comparative Analysis
BASE
authentication
assessment criterion
biblio
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
Submitted by BrandonB on Fri, 05/01/2015 - 8:14am
replay attacks
financial transaction
human auditory system
information fusion
learning (artificial intelligence)
Linear discriminant analysis
machine learning technique linear discriminant analysis
nonstationary signal time-frequency representation
otoacoustic emissions
feature extraction
Robust Biometric Modality
sensor fusion
signal representation
TEOAE
Time-frequency Analysis
transient evoked otoacoustic emission
wavelet analysis
Access Control
falsification attacks
earprint
Data Security
data privacy
cochlea
click stimulus
biometrics (access control)
biometrics
biometric fusion
authorisation
Auditory system
advanced spoofing techniques
advance forgery methods
advanced forgery techniques
acoustic response
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation
file
Tutorial: Understanding and Accounting for Human Behavior
Submitted by jimblythe on Wed, 04/29/2015 - 11:32am. Contributors:
Jim Blythe
Sean Smith
Science of Security
Foundations
Human behavior
ethnography
cognitive bias
Access Control
HotSoS 2015
Academia
Presentation
Tutorials
biblio
Discovering Security Requirements from Natural Language
Submitted by Jamie Presken on Tue, 01/13/2015 - 7:48am
Access Control
auditing
classification
CMU
constraints
July'14
natural language parsing
objectives
Requirements
security
templates
CMU
July'14
biblio
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Control
Modeling
Science of Security
Foundations
Access Control
Architectures
control
distributed systems security
foundations
Human and Societal Aspects of Security and Privacy
modeling
moving-target defense
network security
Phishing
Science of Security
Social Engineering Attacks
Phishing
Access Control
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Distributed Systems Security
Network Security
Moving-Target Defense
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
next ›
last »