Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
SoS Lablet Reports
CPS-VO
»
SoS Archives
»
SoS Lablet Reports
» OCT'15
Oct'15
tearline
Measuring and Improving Management of Today's PKI - UMD - October 2015
Submitted by dml on Fri, 10/16/2015 - 4:36pm
Science of Security
Project PI
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
UMD
Measuring and Improving Management of Today's PKI
Oct'15
tearline
SoS Quarterly Summary Report - CMU - October 2015
Submitted by Jamie Presken on Wed, 10/14/2015 - 6:36am
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Metrics
Resilient Architectures
Human Behavior
CMU
A Language and Framework for Development of Secure Mobile Applications
Epistemic Models for Security
Geo-Temporal Characterization of Security Threats
Highly Configurable Systems
Multi-Model Run-Time Security Analysis
Race Vulnerability Study and Hybrid Race Detection
Science of Secure Frameworks
Secure Composition of Systems and Policies
Security Reasoning for Distributed Systems with Uncertainty
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
USE: User Security Behavior
FY14-18
Oct'15
tearline
Measuring and Improving Management of Today's PKI - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:23pm
Approved by NSA
Metrics
Human Behavior
UMD
Measuring and Improving Management of Today's PKI
FY14-18
Oct'15
tearline
Trust, Recommendation Systems, and Collaboration - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:22pm
Approved by NSA
Scalability and Composability
Policy-Governed Secure Collaboration
Human Behavior
UMD
Trust, Recommendation Systems, and Collaboration
FY14-18
Oct'15
tearline
Trustworthy and Composable Software Systems with Contracts - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:22pm
Approved by NSA
Scalability and Composability
UMD
Trustworthy and Composable Software Systems with Contracts
FY14-18
Oct'15
tearline
User-Centered Design for Security - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:21pm
Approved by NSA
Metrics
Human Behavior
UMD
User-Centered Design for Security
FY14-18
Oct'15
tearline
Reasoning about Protocols with Human Participants - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:20pm
Approved by NSA
Human Behavior
UMD
Reasoning about Protocols with Human Participants
FY14-18
Oct'15
tearline
Understanding Developers' Reasoning about Privacy and Security - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:20pm
Approved by NSA
Human Behavior
UMD
Understanding Developers' Reasoning about Privacy and Security
FY14-18
Oct'15
tearline
Human Behavior and Cyber Vulnerabilities - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:19pm
Approved by NSA
Metrics
Human Behavior
UMD
Human Behavior and Cyber Vulnerabilities
FY14-18
Oct'15
tearline
Empirical Models for Vulnerability Exploits - UMD - October 2015
Submitted by jkatz on Mon, 10/12/2015 - 11:18pm
Approved by NSA
Metrics
UMD
Empirical Models for Vulnerability Exploits
FY14-18
Oct'15
« first
‹ previous
1
2
3
4
5
next ›
last »