Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
Receivers
man-in-the-middle attack
man-in-the-middle attacks
Metrics
personal data disclosure
personally identifiable information
PII
policy-based governance
privacy
pubcrawl
Python
Information Assurance
reputation
resilience
Resiliency
Scalability
Self-Sovereign Identity
self-sovereign identity agents
Sensitivity
user autonomy
user immutability
Data disclosure
attribute sensitivity score model
authorisation
blockchain
blockchains
collaboration
composability
confidence level
credential exchange
credential exchanges
attribute sensitivity
data privacy
distributed ledger
Engines
Human behavior
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
The EGRBAC Model for Smart Home IoT
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
home automation
smart houses
smart home IoT
extended generalized role based access control model
EGRBAC model
AWS-IoT Greengrass
RBAC
Information Reuse and Security
Context modeling
Compositionality
authorisation
Smart homes
Computational modeling
pubcrawl
Resiliency
Adaptation models
smart devices
Internet of Things
Access Control
biblio
An Empirical Analysis on the Usability and Security of Passwords
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
empirical analysis
phonemes
passwords
password-based authentication systems
password security
password creation strategies
Information Reuse and Security
Guidelines
Compositionality
password
security
security experts
message authentication
usability
Entropy
authentication
NIST
pubcrawl
Resiliency
authorisation
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
IOTA Tangle
web of trust approach
Trusted Computing
trusted authority
Trust Management Framework
Trust framework
sensors
self sovereign identity
self sovereign identities
Scalability
Resiliency
resilience
quantifiable trust
pubcrawl
proprietary environments
permissionless environment
web of trust
IoT devices
Internet of Things devices
Internet of Things
IDMS
identity management system
Identity management
Human behavior
enclosed environments
DLT's network
Distributed Ledger Technology
Distributed databases
decentralized Identity
automatic trust rating
authorisation
arbitrary identities
biblio
Research on Decentralized Identity and Access Management Model Based on the OIDC Protocol
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Identity management
unified authentication service
Scalability
Resiliency
resilience
reliable authentication service
pubcrawl
personal security information
personal information security problems
personal identity access management model
OIDC protocol
message authentication
access management application cluster
identity information
Human behavior
encryption services
decentralized identity authentication
Decentralized ID
Cryptographic Protocols
certificate authority
authorisation
authentication rules
application system
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
1
2
3
4
5
6
7
8
9
…
next ›
last »