Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ethereum
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:22pm
SSI
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
Open Source Software
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
blockchain
Mobile Applications
IdM
identity management systems
identity management system
Identity management
Human behavior
ethereum
Distributed databases
digital services
DID
Decentralized IDentifier
decentralized application
Decentralized App
DApp
Cryptography
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
Finding Concurrency Exploits on Smart Contracts
Submitted by grigby1 on Tue, 10/06/2020 - 2:00pm
Cryptography
smart contracts
smart contract
security of data
security attacks
security
Resiliency
resilience
pubcrawl
Metrics
general miner-side type
ethereum
cyber physical systems
application domains
CPS
contracts
Concurrent computing
concurrency exploits
concurrency exploit
Concurrency
composability
business services
business data processing
blockchain
Bars
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Decentralized Attestation of Conceptual Models Using the Ethereum Blockchain
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
Ethereum blockchain
software connector
globally unique identifiers
existence proofs
Ethereum account
Decentralized Identifiers
decentralized attestation methods
cryptographic verification
Conceptual Modeling
blockchain-based attestation
ADOxx metamodeling platform
distributed ledger
Hash functions
Cryptography
certification
ethereum
smart contracts
Distributed databases
blockchain
composability
pubcrawl
Human behavior
Resiliency
computer architecture
attestation
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Facing parallel market and counterfeit issues by the combined use of blockchain and CP-ABE encryption technologies
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
distributed fashion
value propositions
user experience
Small & Medium Enterprises
Scalability
pubcrawl
provision trusted information
product tagging solution
product tagging
policy-based governance
parallel market
financial data processing
ethereum
DLT
blockchain
Distributed databases
cryptocurrency purposes
cryptocurrencies
CP-ABE encryption technique
CP-ABE
counterfeit products
counterfeit issues
collaboration
business models
brand protection
brand
blockchains
« first
‹ previous
1
2
3
4
5
next ›
last »