Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust establishment
biblio
TRUFL: Distributed Trust Management Framework in SDN
Submitted by aekwall on Mon, 11/18/2019 - 10:49am
cloud environment
PKI Trust Models
trust management schemes
Trust management
TRUFL framework scales
transfer rates
public key infrastructure
distributed trust mechanism
distributed trust management framework
digital signatures
data plane-control plane elements
Control Plane-Application Plane
control plane elements
cloud infrastructure
centralized trust management
trust establishment
computer network security
public key cryptography
Public key
SDN
Metrics
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
Trusted Computing
Protocols
authorization
Scalability
Cloud Computing
biblio
A management framework for secure multiparty computation in dynamic environments
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
Robustness
Metadata Discovery Problem
trust establishment
SMC session
privacy-preserving collaborative computation
orchestration
management overhead
management framework
groupware
dynamic environments
Logic gates
secure multiparty computation
metadata
security of data
Cryptography
Peer-to-peer computing
privacy
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
Internet of Things
data privacy
Scalability
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 10:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication