Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Permission
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Not On My Phone: Exploring Users' Conception of Related Permissions
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
expert systems
Human Factors
materialization
mental models
mobile
Permission
privacy
pubcrawl
Scalability
biblio
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
Access Control
Android OS
Human behavior
Permission
Policy
privacy
Privacy Policies
Privacy Policy
pubcrawl
Scalability
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 10:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment
Submitted by grigby1 on Mon, 11/13/2017 - 10:59am
Access Control
composability
Permission
pubcrawl
Resiliency
sandbox
sandboxing
Trusted Execution Environment
trusted platform modules
biblio
Securing a Deployment Pipeline
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
Analytical models
continuous deployment
deployment pipeline security
DevOps
engineering process
Permission
Pipelines
pubcrawl170112
security of data
Software
Supply Chain
supply chains
trusted components
Trusted Computing
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
« first
‹ previous
1
2