Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RBAC
biblio
Towards a Trust-based Model for Access Control for Graph-Oriented Databases
Submitted by grigby1 on Fri, 08/12/2022 - 1:25pm
composability
TRUST.
NOSQLdatabases
BIGDATA
RBAC
Computing Theory
trust
social networking (online)
NoSQL databases
Data Security
security
Big Data
Databases
Computational modeling
Access Control
Resiliency
resilience
Human behavior
pubcrawl
biblio
Security Fault Tolerance for Access Control
Submitted by grigby1 on Thu, 06/24/2021 - 9:53am
Access Control
authentication
authorization
Autonomic Security
composability
EACL
fault tolerance
Fault tolerant systems
Permission
pubcrawl
RBAC
resilience
Resiliency
security fault tolerance
biblio
The EGRBAC Model for Smart Home IoT
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
home automation
smart houses
smart home IoT
extended generalized role based access control model
EGRBAC model
AWS-IoT Greengrass
RBAC
Information Reuse and Security
Context modeling
Compositionality
authorisation
Smart homes
Computational modeling
pubcrawl
Resiliency
Adaptation models
smart devices
Internet of Things
Access Control
biblio
Re-encrypted Data Access Control Scheme Based on Blockchain
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
Cloud Computing
Access Control
encryption
Proxy re-encryption
Resiliency
pubcrawl
privacy
blockchain
Aerospace electronics
expandability
Compositionality
privacy protection
Thermal stability
RBAC
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
attribute certificate
collaboration
updating distributing keys
role-based access control
RBAC
Performance
key update
existing CP-ABE based schemes
efficient key update function
efficient data Access Control
data outsourcing environment
CP-ABE policy
Ciphertext Policy - Attribute-based Encryption
Attribute certificate management
Cryptography
access request
access control model
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Access Control
CP-ABE
policy-based governance
pubcrawl
Conferences
Scalability
outsourcing
Cloud Computing
authorisation
biblio
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
IoT architecture
virtualization privacy
Virtual Objects
security
Resiliency
RBAC
pubcrawl
privacy
Metrics
ABAC
Internet of Things (IoT)
Human behavior
Devices
composability
aws iot
ACL
Access Control
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation