Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ABAC
biblio
Implement Security Analysis of Access Control Policy Based on Constraint by SMT
Submitted by grigby1 on Fri, 05/12/2023 - 9:15am
Scalability
satisfiability modulo theories
policy analysis
Resiliency
Control Theory
Transforms
Semantics
ABAC
Access Control
information security
Analytical models
security
performance evaluation
Conferences
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Blockchain and ABAC Based Data Access Control Scheme in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 4:06pm
blockchain
information sharing
blockchains
File systems
smart contract
data sharing
smart grid security
Metrics
smart contracts
information security
ABAC
process control
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
Scalability
zero trust
usage control
Smart homes
trust
ABAC
Prototypes
authorization
privacy
computer architecture
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
IoT
Monitoring
Internet of Things
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
HGAA: An Architecture to Support Hierarchical Group and Attribute-Based Access Control
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
Scalability
ABAC
Access Control
architecture
Attribute authority
attribute certificate
attribute-based access control
HGAA
HGABAC
hierarchical group and attribute-based access control
hierarchical group attribute architecture
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
IoT architecture
virtualization privacy
Virtual Objects
security
Resiliency
RBAC
pubcrawl
privacy
Metrics
ABAC
Internet of Things (IoT)
Human behavior
Devices
composability
aws iot
ACL
Access Control
biblio
Classifying and Comparing Attribute-Based and Relationship-Based Access Control
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
ABAC
Access Control
attribute
Control Theory
Human behavior
human factor
privacy
pubcrawl
rebac
relationship
resilience
Resiliency
Scalability
biblio
Proposed Model for Natural Language ABAC Authoring
Submitted by grigby1 on Thu, 05/24/2018 - 11:32am
ABAC
business rules
collaboration
natural language policies
Policy
Policy Based Governance
policy semantics
policy-based governance
pubcrawl
RDF analytics
SPARQL queries
XACML authoring tool
biblio
Attribute Based Access Control for Healthcare Resources
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
ABAC
Access Control
authorization
collaboration
FHIR
Policy
Policy Based Governance
policy-based governance
pubcrawl
rest
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
1
2
next ›
last »