Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

network participants

biblio

Visible to the public A trust-based security enforcement in disruption-tolerant networks

Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
  • security enforcement
  • mobile computing
  • network participants
  • Peer-to-peer computing
  • privacy
  • pubcrawl
  • Routing protocols
  • security
  • security credentials
  • Medical services
  • security of data
  • subjective logic
  • telecommunication security
  • trust model
  • trust-based security enforcement
  • Trusted Computing
  • uncertainty
  • web of trust
  • delay tolerant networks
  • authentication
  • authorisation
  • central trusted entity
  • centralised trusted authorities
  • composability
  • Compositionality
  • computational intelligence
  • Cryptography
  • attribute-based access control
  • Delay-tolerant networks
  • delays
  • disruption- and delay-tolerant networks
  • disruption-tolerant networks
  • DTN
  • high packet drop rates
  • long delays
biblio

Visible to the public Integrity based relationships and trustworthy communication between network participants

Submitted by BrandonB on Fri, 05/01/2015 - 9:10am
  • OSI layer 2
  • Unicast
  • trustworthy communication
  • Trusted Platform Module
  • Trusted Computing
  • trust establishment
  • trust
  • Servers
  • security
  • Protocols
  • protocol design
  • Payloads
  • participating node
  • authenticated node
  • operating system integrity
  • network participants
  • integrity based relationship
  • integrity
  • insider threat
  • industrial networks
  • encryption
  • cyber-physical systems
  • Cryptographic Protocols
  • computer network security
  • authentication protocol
  • authentication

Terms of Use  |  ©2023. CPS-VO