Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Architecture
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 10:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
decentralized CP-ABE
Software Architecture
security scalability
security degradations
Scalability
revocation
pubcrawl
multi-authority architecture
Multi-authority
group sharing applications
flexible access policies
encryption
Access Control
decentralized attribute-based encryption access control
data confidentiality
Cryptography
cryptographic method
computer architecture
Companies
cloud environment
Cloud Computing
authorization
attribute-based encryption
attribute revocation
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
The Blockchain as a Software Connector
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
distributed software architectures
untrusted participants
transactional data sharing
Trade-off
software quality
software connector
Software Architecture
Software
Scalability
Resiliency
quality attributes
pubcrawl
Peer-to-peer computing
Online banking
architectural decision
distributed processing
design trade-offs
design
decentralized data sharing
decentralized blockchain
data handling
Cryptography
contracts
Connectors
blockchain security
blockchain
Australia
Architecture connector
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »