Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policy
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 12:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
DTE Access Control Model for Integrated ICS Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Industrial Control Systems Anomaly Detection
Access Control
Domain and Type Enforcement
DTE Firewall
Industrial Control Systems
pubcrawl
resilience
Resiliency
Scalability
security policy
Segregation
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 8:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Research on Storage Mechanism of Cloud Security Policy
Submitted by aekwall on Tue, 10/22/2019 - 8:53am
cloud security policy
Security Policies Analysis
XML
storage mechanism
security policy
Secure storage
popular policy repositories
policy storage technology
policy repository
policy information
Key Words: Cloud Computing
Formal concept analysis
security of data
cloud computing security
storage management
Cloud Security
relational databases
Lattices
testing
policy-based governance
pubcrawl
cloud storage
Cloud Computing
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
GUARDIA: Specification and Enforcement of Javascript Security Policies Without VM Modifications
Submitted by aekwall on Mon, 06/17/2019 - 9:20am
pubcrawl
policy-based governance
JavaScript
security policies
DSL
language design
reflection
runtime enforcement
security policy
web security
biblio
A Framework for Managing User-defined Security Policies to Support Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 9:20am
pubcrawl
policy-based governance
NSF
security management
security policy
security policies
biblio
Study on Data Security Policy Based on Cloud Storage
Submitted by grigby1 on Thu, 08/23/2018 - 10:43am
Data models
user data security risk analysis
storage management
Servers
security policy
security of data
Secure storage
pubcrawl
network storage technology
data security policy
Data Security
Cloud Computing
data leakage
Cryptography
Computational modeling
computational intelligence
Compositionality
composability
cloud storage system structural characteristics
cloud storage security policy
cloud storage
cloud computing environment
biblio
A Flexible Architecture for Orchestrating Network Security Functions to Support High-level Security Policies
Submitted by grigby1 on Wed, 02/21/2018 - 12:43pm
Network Security Architecture
NFV
NSF
pubcrawl
resilience
Resiliency
security management
security policy
« first
‹ previous
1
2
3
next ›
last »