Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy challenges
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach
Submitted by grigby1 on Mon, 11/13/2017 - 10:50am
collaboration
composability
data privacy
EU FP7 project
Internet of Things
IoT middleware
middleware
privacy challenges
pubcrawl
RERUM middleware
Resiliency
security
security challenges
security of data
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation