Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Context-aware security

biblio

Visible to the public From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty

Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
  • Mobile handsets
  • ubiquitous computing
  • stochastic programming models
  • stochastic programming
  • security policy planning
  • security policies
  • security of data
  • security economics
  • reactionary security
  • pubcrawl
  • proactive security
  • policy-based governance
  • Policy
  • Access Control
  • mathematical optimization
  • Government
  • Governance
  • context-aware security policy management
  • Context-aware security
  • context-aware computing
  • Context modeling
  • Context
  • Computational modeling
  • collaboration
  • Adaptation models
biblio

Visible to the public i/k-Contact: A context-aware user authentication using physical social trust

Submitted by BrandonB on Tue, 05/05/2015 - 8:56am
  • Mobile-device-management (MDM)
  • visualization
  • visual contact
  • user authentication
  • ubiquitous computing
  • Trusted Computing
  • Social trust
  • Servers
  • physical trust relationship
  • physical social trust
  • Physical communication
  • authentication
  • Mobile handsets
  • i-k Contact mechanism
  • context-aware user authentication
  • Context-aware security
  • Context
  • Companies
  • Big Data application
  • authorisation
  • authentication system
  • authentication control

Terms of Use  |  ©2023. CPS-VO