Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Access Control Scheme Supporting Attribute Revocation in Cloud Computing
Submitted by aekwall on Tue, 01/25/2022 - 2:54pm
Cloud Computing
data privacy
attribute-based encryption
encryption
Access Control
Public key
pubcrawl
Scalability
Human behavior
policy-based governance
Market research
Costs
attribute revocation
biblio
Ciphertext-Policy Attribute-Based Encryption for General Circuits in Cloud Computing
Submitted by aekwall on Tue, 01/25/2022 - 2:54pm
Logic gates
privacy
data privacy
attribute-based encryption
Access Control
pubcrawl
Scalability
Human behavior
policy-based governance
data integrity
Cloud Computing
access policy
Backtracking
circuit
Costs
biblio
Unified Attribute-Based Encryption Scheme for Industrial Internet of Things
Submitted by aekwall on Tue, 01/25/2022 - 2:53pm
privacy
performance evaluation
attribute-based encryption
Conferences
encryption
Access Control
pubcrawl
Scalability
Human behavior
Internet of Things
Industries
policy-based governance
component
industrial control
Industrial Internet of Things
wireless sensor and actuator network
biblio
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model
Submitted by aekwall on Tue, 01/25/2022 - 2:53pm
Logic gates
Peer-to-peer computing
attribute-based encryption
Access Control
Conferences
encryption
pubcrawl
Scalability
Human behavior
Receivers
standards
policy-based governance
Chosen-ciphertext attacks
Linear Secret Sharing
biblio
Services for Zero Trust Architectures - A Research Roadmap
Submitted by grigby1 on Tue, 12/21/2021 - 2:22pm
Access Control
collaboration
Conferences
Design methodology
Human behavior
Human Factors
networks
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
security
service-oriented architecture
zero trust
biblio
Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust
Submitted by grigby1 on Tue, 12/21/2021 - 2:20pm
OpenFlow
zero-trust
zero trust
telecommunication traffic
Scalability
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
Access Control
network security
identity authentication
Human Factors
Human behavior
equipment portrait
computer network reliability
computer architecture
collaboration
authentication
biblio
Dynamic Access Control Technology Based on Zero-Trust Light Verification Network Model
Submitted by grigby1 on Tue, 12/21/2021 - 2:19pm
micro-segmentation
Zero trust policy
zero trust
usability
Technical management
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
Acoustic Fingerprints
lighted verification
Inspection
Human Factors
Human behavior
dynamic access control
Computational modeling
collaboration
Cloud Computing
Access Control
biblio
Accountability in the Decentralised-Adversary Setting
Submitted by aekwall on Mon, 12/20/2021 - 11:30am
Cryptography
Task Analysis
Protocols
tools
Analytical models
Access Control
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
accountability
consumer behavior
verification
Adversary Models
biblio
Blockchain-Based Scheme for Authentication and Capability-Based Access Control in IoT Environment
Submitted by grigby1 on Mon, 11/29/2021 - 1:51pm
Access Control
authentication
blockchain
capability
Human behavior
Human Factors
Internet of Things
interoperability
IoT
Metrics
pubcrawl
Scalability
smart contracts
Tamper resistance
biblio
A Context-Policy-Based Approach to Access Control for Healthcare Data Protection
Submitted by grigby1 on Mon, 11/29/2021 - 1:49pm
Medical services
Tamper-Resistance
Tamper resistance
Sensor Systems
sensors
Scalability
pubcrawl
Protocols
Metrics
Access Control
Identification
Human Factors
Human behavior
Context modeling
computer security
authorization
authentication
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »