Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory
Submitted by grigby1 on Wed, 06/02/2021 - 12:19pm
Key-Policy-Attribute-Based Encryption
Signcryption
Scalability
Rough sets
rough set theory
Resiliency
resilience
reduct
pubcrawl
privacy
Access Control
Human behavior
Generalized signcryption
encryption
CORE
Control Theory
Conferences
CloudHealthData
Cloud Computing
Attribute-Based Encryption (ABE)
biblio
EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data
Submitted by grigby1 on Wed, 05/26/2021 - 11:37am
Access Control
access policy
Ciphertext policy attributes-based encryption (CP-ABE)
Cloud Computing
collaboration
CP-ABE
Cryptography
encryption
Performance analysis
Policy Based Governance
policy revocation
pubcrawl
Scalability
Servers
Systems architecture
Updating Policy Level
biblio
Improved Attribute-Based Encryption Scheme in Fog Computing Environment for Healthcare Systems
Submitted by grigby1 on Wed, 05/26/2021 - 11:37am
Access Control
collaboration
CP-ABE
Fog computing
Healthcare
Outsourced CP-ABE
Policy Based Governance
pubcrawl
Scalability
biblio
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
Submitted by aekwall on Tue, 05/25/2021 - 3:34pm
sensors
Macaroons
cyber-physical
CHERI
robotics
CPS Privacy
Robot sensing systems
industrial control
Human Factors
security
integrated circuits
privacy
pubcrawl
Kernel
Task Analysis
Hardware
Access Control
biblio
Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption
Submitted by aekwall on Tue, 05/25/2021 - 3:19pm
Scalability
encryption
Access Control
pubcrawl
policy-based governance
law enforcement
Knowledge Discovery
distributed computing
Time complexity
CP-ABE
ciphertext-policy attribute-based encryption
Algebraic Decision Diagram
Constant Secret
fast decryption
pseudo-Boolean function
Systems support
biblio
Responsibility Attribution Against Data Breaches
Submitted by aekwall on Thu, 05/13/2021 - 11:48am
Human behavior
pubcrawl
composability
Metrics
attribution
Access Control
Ontology
Cost Model
Data Breach
Electronic Crimes
policy model
Responsibility Attribution
biblio
Lightweight Verification and Fine-grained Access Control in Named Data Networking Based on Schnorr Signature and Hash Functions
Submitted by aekwall on Mon, 05/03/2021 - 1:15pm
encryption
Access Control
Resiliency
pubcrawl
internet
Mathematical model
authentication
Public key
verification
Scalability
NDN
Predictive Metrics
Compositionality
Schnorr signature
Hash functions
scalable verification
biblio
Scalable Impact Range Detection against Newly Added Rules for Smart Network Verification
Submitted by aekwall on Mon, 05/03/2021 - 1:14pm
packet forwarding
packet equivalence class
network verification
impact range recognition
Hasse diagram
scalable verification
Compositionality
Predictive Metrics
Scalability
Cloud Computing
Firewalls (computing)
detection algorithms
pubcrawl
Resiliency
Internet of Things
Access Control
Servers
IP networks
biblio
The Security Policies Optimization Problem for Composite Information Systems
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Information systems
Task Analysis
security policy
security policies
security
policy-based governance
optimization
operating systems
mandatory access control
pubcrawl
information security
discretionary access control
Access Control
Metrics
composability
resilience
Resiliency
Operating systems security
biblio
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage
Submitted by aekwall on Tue, 04/27/2021 - 1:25pm
Cloud Computing
encryption
Access Control
Frequency measurement
Resiliency
pubcrawl
composability
outsourcing
searchable encryption
attribute revocation
attribute-based searchable encryption
flexible access policy
rank
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »