Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
capabilities
biblio
Enterprise Architecture Frameworks Assessment: Capabilities, Cyber Security and Resiliency Review
Submitted by aekwall on Fri, 02/04/2022 - 9:34am
Resilient Security Architectures
Buildings
capabilities
Companies
Complexity theory
Computer crime
cyber security requirement
Cybersecurity
data analysis
Enterprise Architecture
information technology
NIST
pubcrawl
Resiliency
Resilient
security architecture framework
biblio
SciTokens: Capability-Based Secure Access to Remote Scientific Data
Submitted by aekwall on Mon, 10/28/2019 - 9:39am
capabilities
Compositionality
distributed computing
OAuth
Predictive Metrics
pubcrawl
Resiliency
Scientific Computing Security
file
Melicher_Capability_Based_Module_JA.pdf
Submitted by Jamie Presken on Tue, 07/11/2017 - 10:44am
A Language and Framework for Development of Secure Mobile Applications
August'17
authority
capabilities
CMU
language-based security
modules
Scalability and Composability
biblio
A Capability-Based Module System for Authority Control
Submitted by Jamie Presken on Tue, 07/11/2017 - 10:43am
A Language and Framework for Development of Secure Mobile Applications
August'17
authority
capabilities
CMU
language-based security
modules
Scalability and Composability
Scalability and Composability
CMU
A Language and Framework for Development of Secure Mobile Applications
August'17
biblio
M3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores
Submitted by grigby1 on Tue, 05/30/2017 - 11:45am
accelerators
capabilities
composability
heterogeneous architectures
linux operating systems security
Metrics
on-chip networks
operating systems
pubcrawl
Resiliency
biblio
Modules in Wyvern: Advanced Control over Security and Privacy
Submitted by grigby1 on Mon, 05/22/2017 - 12:58pm
authority
capabilities
collaboration
Human Factors
language-based security
Metrics
modules
pubcrawl
Resiliency
safe coding standards
Security by Default
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Wed, 05/06/2015 - 9:48am
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities
biblio
Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
education
sustainable security advantage
security of data
security controls
security advantage
security
proactive security posture
privacy
Organizations
knowledge integration
capabilities
cybersecurity readiness
cybersecurity capability maturity model
critical asset protection
Context
Computer crime
CM2 model
CM2
Capability maturity model