Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XACML
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
Reactive Access Control Systems
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
context-aware applications
contingency plan
fuzzy inference
Human behavior
Human Factors
Metrics
pubcrawl
reactive access control system
resilience
Resiliency
Risk
Scalability
Security Risk Estimation
XACML
biblio
Automated Coverage-Based Testing of XACML Policies
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
Access Control
coverage criteria
Mutation testing
policy-based governance
pubcrawl
Security Policies Analysis
test generation
XACML
biblio
XACML Policies into mongoDB for Privacy Access Control
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
ALFA
Human behavior
MongoDB
Policy
privacy
Privacy Policies
Privacy Policy
pubcrawl
purpose fine grained access control
Scalability
XACML
biblio
Secure Policy-based Device-to-device Offloading for Mobile Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:27pm
Policy Based Governance
collaboration
Data Security
Governance
hybrid mobile cloud computing
mobile application offloading
mobile cloud computing
mobile device attestation
Policy
policy-based governance
pubcrawl
security policies
XACML
biblio
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
health care
XACML policies
XACML
similarity analysis
Security Policies Analysis
security
secure privacy-preserved EHR systems
secure integrated systems
pubcrawl
privacy
policy-based governance
patients privacy
large scale healthcare system
hospitals
Access Control
electronic healthcare systems
electronic health records
electronic health record
distributed systems
distributed processing
Data Security
data privacy
Cryptography
computer network
collaboration
authorisation
access control policy combination
biblio
A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules
Submitted by grigby1 on Tue, 09/26/2017 - 12:42pm
Access Control
Coq
formal verification
Human behavior
policy analysis
program correctness
pubcrawl
Resiliency
Scalability
Security Policies Analysis
XACML
biblio
An Authorization Service for Collaborative Situation Awareness
Submitted by grigby1 on Thu, 04/20/2017 - 12:45pm
Access Control
composability
expert systems
Human behavior
Metrics
privacy
pubcrawl
Resiliency
Scalability
security-as-a-service
situational awareness
XACML
biblio
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
ABAC
Access Control
Algorithms
complexity
computer security
graph theory
insider
insider threat
Network reconnaissance
NGAC
NIST
policy machine
pubcrawl
Resiliency
simultaneous instantiation
XACML