Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Performance Evaluation for Secure Internet Group Management Protocol and Group Security Association Management Protocol
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
multicast communication
Unicast
telecommunication security
security
secure Internet Group Management Protocol
Resiliency
resilience
pubcrawl
Protocols
object oriented security
Object oriented modeling
multicast protocols
multicast distribution
authorisation
Metrics
media streaming
IPTV
IP networks
IP multicast technology
Internet service providers
Internet protocol television
internet
Group Security Association Management Protocol
data delivery
composability
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Authentication and Recognition, Guarantor for on-Line Security
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Linux
Windows Operating System Security
web services
Web Service
Web browser
SOAP
rest
Resiliency
resilience
operating systems (computers)
operating systems
Mobile handsets
mobile desktop
Metrics
iOS Security
face recognition-based authentication service
face recognition authentication service
face recognition
face biometrics
composability
biometrics (access control)
BEWARE
authorisation
ARGOS
anti-spoofing
3rd party service organizations
3D frontal facing camera
pubcrawl
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Blockchain-Based Management of Video Surveillance Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
video surveillance system
video metadata
trusted internal managers
private DB
internal manager
DRM-applied video player
decryption key
data forgery
blockchain-based management
blockchain system
blockchain network
Hyperledger Fabric
IPFS
Fabrics
authorisation
video surveillance
Streaming media
meta data
distributed ledger
blockchain
Metrics
Peer-to-peer computing
Licenses
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
Security Metrics
security policies generation
policy basedsecurity management
generative policy based system
administrative overhead
Manuals
complex systems
security policies
security management
computer network security
Measurement
computer security
Grammar
policy-based governance
pubcrawl
computer network management
Access Control
authorisation
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Trust Enhancement Scheme for Cross Domain Authentication of PKI System
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
multiple PKI systems
unified trust service problem
Trusted Computing
trust enhancement scheme
Trust delivery
traditional trusted third party
Scalability
Resiliency
public key infrastructure
public key cryptography
pubcrawl
PKI Trust Models
PKI management domains
PKI (Public Key Infrastructure)
authentication
Metrics
Human behavior
e-government applications
E-Government
Distributed databases
cross-domain authentication
cross-domain
CRL
certificate revocation list
blockchain consensus
blockchain
authorisation
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »