Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
policy-based governance
biblio
Using Stylometry to Attribute Programmers and Writers
Submitted by grigby1 on Mon, 03/05/2018 - 12:02pm
attribute-based encryption
attribution
collaboration
Human behavior
Human Factors
machine learning
policy-based governance
privacy
pubcrawl
Scalability
stylometry
biblio
ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine
Submitted by grigby1 on Mon, 03/05/2018 - 12:02pm
attribute hierarchy
attribute-based access control
attribute-based encryption
collaboration
group attributes
group hierarchy
Human behavior
Human Factors
policy machine
policy-based governance
pubcrawl
Scalability
biblio
Attribute Transformation for Attribute-Based Access Control
Submitted by grigby1 on Mon, 03/05/2018 - 12:02pm
attribute based access control
attribute expansion
attribute reduction
attribute transformation
attribute-based encryption
collaboration
Human behavior
Human Factors
policy-based governance
pubcrawl
Scalability
biblio
Attribution Apprehension, Automated Attribution, and Creative Integration
Submitted by grigby1 on Mon, 03/05/2018 - 12:02pm
attribute-based encryption
attribution apprehension
automated attribution
collaboration
creative integration
fairness
Human behavior
Human Factors
policy-based governance
pubcrawl
Scalability
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
Mobile Cloud middleware
web services
Web service governance
security of data
security criteria regulation middleware
security criteria regulation
security
pubcrawl
policy-based governance
Policy Based Governance
Policy
PGP
PDP
Organizations
multicloud tenancies
asset consumer security profiles
middleware
ESB-integrated middleware
cumbersome policy files
computing power
computing functionality
computer architecture
component
complex composite service
colosum scaling property
collaboration
Cloud Computing
attribute-based security policy model
attribute-based security policy
biblio
The Influence of Data Protection and Privacy Frameworks on the Design of Learning Analytics Systems
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
Security by Default
collaboration
Data protection
data protection by default
data protection by design
learning analytics
learning analytics process requirements
learning analytics systems design
personal information
Policy
policy-based governance
privacy by design
privacy frameworks
pubcrawl
biblio
Attribute Based Access Control for Healthcare Resources
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
ABAC
Access Control
authorization
collaboration
FHIR
Policy
Policy Based Governance
policy-based governance
pubcrawl
rest
biblio
Quantitative Analysis of Measurement Overhead for Integrity Verification
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
Policy Based Governance
batch extend
collaboration
core measurement
integrity
measurement overhead
Policy
policy-based governance
pubcrawl
verification
« first
‹ previous
…
93
94
95
96
97
98
99
100
101
…
next ›
last »