Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Lead
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
SOAPAction spoofing
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
schema validation
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
Information services
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
API
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
biblio
Near-pri: Private, proximity based location sharing
Submitted by BrandonB on Mon, 05/04/2015 - 1:17pm
Near-Pri
Vegetation
user location information privacy
social networking (online)
smartphone ubiquity
smart phones
Protocols
private proximity testing
private proximity based location sharing
privacy
polynomials
Android application
mobile computing
location value representation
location information sensitivity
location based systems
location based services
Lead
Homomorphic encryption
Facebook online social network
Facebook
Cryptography
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead
« first
‹ previous
1
2