Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prototypes
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution
biblio
On visualizing threat evaluation configuration processes: A design proposal
Submitted by BrandonB on Thu, 04/30/2015 - 1:51pm
military computing
Weapons
visualization
transparency
threat evaluation configuration process
threat evaluation
threat estimation
relevant parameter
Prototypes
Proposals
proof-of-concept prototype
military expert system designer
Data models
human computer interaction
high-level information fusion
Guidelines
expert systems
expert operators
estimation theory
estimation
design proposal
design process model
design
decision-making
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication
« first
‹ previous
…
8
9
10
11
12
13
14
15
16