Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

security-critical data

biblio

Visible to the public Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy

Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
  • UAVs
  • value-added services
  • standardisation
  • standard gap analysis
  • solid technical foundation
  • security-critical data
  • security-critical
  • regulatory foundation
  • quality living
  • optimised management
  • mobile IoT devices
  • Gap Analysis
  • data-driven systems
  • Data Protection and Privacy
  • Unmanned Aerial Vehicles
  • data privacy
  • autonomous aerial vehicles
  • interoperability
  • trustworthiness
  • Energy Efficiency
  • Data protection
  • standards
  • composability
  • pubcrawl
  • Trusted Computing
  • Protocols
  • privacy-sensitive data
  • security
  • Internet of Things
biblio

Visible to the public Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses

Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
  • memory mapping primitive
  • Web functionality
  • Web Browser Security
  • Semantics
  • security of data
  • security-critical data
  • security
  • script level
  • Resiliency
  • rendering (computer graphics)
  • Reliability
  • pubcrawl
  • process memory
  • process isolation
  • online front-ends
  • Metrics
  • arbitrary script code cross-origin execution
  • memory disclosure vulnerabilities
  • isolation policies
  • Internet Explorer
  • internet
  • Human behavior
  • HTTP cookie leakage
  • data-only attacks
  • cross-platform memory cartography framework
  • control flow hijacking
  • computer architecture
  • Chrome
  • Browser Security
  • Browsers
  • backward compatibility

Terms of Use  |  ©2023. CPS-VO