Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Architecture
biblio
Reusing Security Solutions: A Repository for Architectural Decision Support
Submitted by K_Hooper on Wed, 11/01/2017 - 11:09am
expert systems
Human behavior
pubcrawl
resilience
reusing security solutions
Scalability
secure architecture
Secure Software Development
security by design
Security Engineering
Software Architecture
biblio
Mitigating Security Threats Using Tactics and Patterns: A Controlled Experiment
Submitted by grigby1 on Fri, 10/27/2017 - 12:10pm
Metrics
security
pubcrawl
Resiliency
Human behavior
Scalability
security patters
security tactics
Software Architecture
software architecture security experiment
threat mitigation
biblio
Architecture-Driven Penetration Testing Against an Identity Access Management (IAM) System
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
Human behavior
identity and access management environment
Identity management
Metrics
OAuth 2.0
Penetration Testing
pubcrawl
Resiliency
Scalability
Software Architecture
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 12:47pm
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 12:20pm
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
file
Yuan_Mining_Software_DG.pdf
Submitted by Jamie Presken on Tue, 12/06/2016 - 2:16pm
Apr'16
CMU
Data mining
security
Software Architecture
file
Schmerl_Raindroid_DG.pdf
Submitted by Jamie Presken on Tue, 12/06/2016 - 2:07pm
Apr'16
CMU
security
Self-Adaptation
Software Architecture
biblio
Architecture-Based Run-Time Fault Diagnosis
Submitted by Jamie Presken on Tue, 12/06/2016 - 10:21am
Autonomic computing
CMU
Diagnosis
run-time
Software Architecture
CMU
file
Casanova_Arch_Based_Run_Time_DG.pdf
Submitted by Jamie Presken on Tue, 12/06/2016 - 10:21am
Autonomic computing
CMU
Diagnosis
run-time
Software Architecture
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »