Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policy
biblio
Research and Construction of Dynamic Awareness Security Protection Model Based on Security Policy
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
authentication
collaboration
data acquisition
dynamic awareness
Electric power SCADA
Monitoring
network dynamics
policy-based governance
power systems
pubcrawl
Safety
SCADA systems
SCADA Systems Security
security
Security Policies Analysis
security policy
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
« first
‹ previous
1
2
3