Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identity provider
biblio
IoT Reliability Improvement Method for Secure Supply Chain Management
Submitted by grigby1 on Fri, 09/09/2022 - 4:04pm
supply chain security
Client Certificate
Identity provider
information security
Internet of Things
IoT gateway
Logic gates
Proposals
pubcrawl
Reliability
resilience
Resiliency
Supply Chain
supply chain management
supply chains
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Surveing the challenges and requirements for identity in the cloud
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
user identity federation
Access Control
authentication
business organizations
Claim
cloud
Cloud Computing
cloud service providers
cloud technologies
Computational modeling
security of data
Token
security
Computers
computing resource sharing
data centers
Federated identity
federated identity management
Federation provider
hybrid clouds
Identity provider
Organizations
SaaS