Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
personal data
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
Organizations
Standards organizations
security of data
Resiliency
public healthcare
public health sector
public health enterprises
public health
pubcrawl
Predictive Metrics
personal data cyber security systems
personal data cyber security legislation
personal data
composability
Networked Control Systems Security
network technologies
medical information systems
legislation
Insurance
Information systems
information system
information management
health information management systems
health care
cyber security
computer security
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Central Audit Logging Mechanism in Personal Data Web Services
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
personal data Web services
web services
Web service platform
Web Service
Simple object access protocol
Servers
security of data
Security Audits
Scalability
Routing
Resiliency
resilience
pubcrawl
personal information
access logs
personal data
Law
internet
Human Factors
Human behavior
Databases
data source
central audit logging mechanism
auditing
Audit Logging
application program interfaces
API Policy
API
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Privacy-Aware Infrastructure for Managing Personal Data
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
composability
Metrics
network accountability
networks
personal data
privacy
pubcrawl
Resiliency
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
« first
‹ previous
1
2