Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer bootstrapping
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 12:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices