Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud users
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
An authorized security middleware for managing on demand infrastructure in cloud
Submitted by grigby1 on Mon, 06/11/2018 - 3:45pm
On-demand security
cloud demand infrastructure management
cloud stack
Dual authorization
Dual-Authorization
Dynamic infrastructure request control
handle On-demand Infrastructure request
IaaS
on-demand request
on-demand scheduler
auto scalability feature
on-demand service request handling
rapid elasticity
secure environment
security risks
ubiquitous computing
ubiquitous network access
virtualized computing platform
VM
middleware security
tools
pubcrawl
composability
Scalability
security of data
Cloud Computing
Servers
cloud users
virtualisation
authorization
resilience
Heuristic algorithms
security issues
middleware
Resiliency
Policy
collaboration
policy-based governance
authorized security middleware
Auto scalability
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation