Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
biblio
New paradigms for access control in constrained environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:53pm
Internet of Things
tamper-proof secret keys
standard compliant security protocols
Servers
SCADA
Reliability
PUF
private key cryptography
physical unclonable functions
Oscillators
open systems
mobile computing
message authentication
IoT
interoperability
Access Control
identity management framework
field programmable gate arrays
eSIM
embedded subscriber identity module
constrained resource server
constrained M2M devices
cellular connectivity
Building automation
authorization scheme
authorization
authorisation
authentication
access management framework
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 2:53pm
directory services
virtual shared servers
user authorization
token management system
token granting
Servers
security as a service
mutual authentication
internet
Educational institutions
Access Control
Databases
data correctness
Computers
cloud service
Cloud Computing
authorisation
authentication
access rights
biblio
Implementation of security framework for multiple web applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
MD5
web services
web applications
single sign-on
Servers
security of data
security framework implementation
proxy signature
OpenID
authentication
Informatics
identity management technique
identity management system
encryption
credential problems
Computers
authorization
authentication server
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
cloud service providers
Web based applications
Servers
security management
Protocols
internet
Diameter-AAA
diameter AAA mechanisms
Computational modeling
cloud system architecture
authentication
Cloud Security
Cloud Computing
cloud based services
cloud based applications
Browsers
Availability
authorization and accounting
authorisation
biblio
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
Aggregates
authentication
authentication authorization and accounting management mechanisms
authorisation
authorization
C-BAS
certificate-based AAA architecture
computer architecture
computer network management
Databases
patchy AAA infrastructure
Public key
robust AAA infrastructure
SDN experimentation facilities
Servers
software defined networking
biblio
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
EUDAT collaborative data infrastructure
Unicore project
Servers
SAML
Portals
PKI
Open ID
OAuth
groupware
federated identity management
federated authentication
AAI
EUDAT
distributed data infrastructure
credential translation
Contrail project
Communities
Bridges
authorization
authorisation
authentication and authorisation infrastructure
authentication
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
Delegation-based authentication and authorization for the IP-based Internet of Things
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
IP security protocols
Servers
Random access memory
public-key cryptography
public key cryptography
Protocols
peer authentication
memory-constrained devices
key agreement purposes
IP-based Internet of Things
authorization functionality
IP networks
Internet of Things
DTLS protocol
DTLS connection
delegation-based authentication
delegation server
Cryptographic Protocols
Context
« first
‹ previous
…
86
87
88
89
90
91
92
93
94
next ›
last »