Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor
Submitted by grigby1 on Fri, 01/13/2023 - 11:52am
Ciphers
Training
pubcrawl
resilience
Resiliency
Filtering
Scalability
Linux
Buildings
Context
Security by Default
Costs
biblio
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs
Submitted by grigby1 on Fri, 08/26/2022 - 10:24am
software engineering
leaky assertions
Information Leak
correctness
concurrent programs
axiomatic approach
Concurrency
Context
Concurrent computing
security
Software algorithms
Metrics
programming
real-time systems
composability
Resiliency
resilience
pubcrawl
biblio
Engineering Adaptive Authentication
Submitted by grigby1 on Tue, 01/25/2022 - 3:51pm
adaptive systems
security
pubcrawl
resilience
Resiliency
Conferences
authentication
Object recognition
composability
Decision Making
Context
navigation
Autonomic Security
Adaptive Authentication
authentication method
Requirements
biblio
Contextual Privacy Policy Modeling in IoT
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
IoT Privacy Taxonomy
taxonomy
smart buildings
Scalability
pubcrawl
Privacy Policy
Privacy Policies
Privacy Formalization
privacy
Context
IoT
Internet of Things
Intelligent sensors
Human behavior
data privacy
Cyberspace
cyber-physical systems
Context modeling
biblio
An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion
Submitted by grigby1 on Fri, 08/28/2020 - 11:31am
occlusion
visualization
visual interruptions
virtual information display
Three-dimensional displays
spatial overlays
security requirements
Scalability
resilience
pubcrawl
proximity
privacy
perception
partial occlusion connection lines
3D scenes
maintenance engineering
Information systems
information connection evaluation
industrial augmented reality applications
Human behavior
Engines
encoding
data visualisation
Context
Color
augmented reality
anchors
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 9:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
Towards a Framework for Engineering Smart-Grid-Specific Privacy Requirements
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
pubcrawl
trees (mathematics)
threat tree analysis
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
security of data
security
Scalability
Safety
Resiliency
resilience
collaboration
project-specific refinement
privacy requirements engineering method
privacy
policy-based governance
Metrics
Human Factors
Human behavior
high level privacy requirement
electric system
data privacy
Context
composability
biblio
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems
Submitted by grigby1 on Mon, 03/09/2020 - 1:56pm
Privacy Engineering
smart power grids
Smart Grids
smart grid system development process
Smart Grid Privacy
smart grid engineers
Smart Grid
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy principles
privacy enhancing technologies
collaboration
privacy
power engineering computing
Positron emission tomography
policy-based governance
Metrics
Law
Human Factors
Human behavior
holistic privacy engineering approach
energy consumers privacy
energy consumers data
data privacy
Context
composability
biblio
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
multisensor fusion
zero-effort multifactor authentication system
zero-effort authentication
ZEMFA
wearables
Walking-pattern
two factor authentication
smart phones
single authentication factor
sensors
pubcrawl
Phone
authentication
multimodal gait biometrics
multidevice fusion
mobile computing
Human Factors
gait analysis
Context
biometrics (access control)
biometrics
authorisation
authentication token
1
2
3
4
5
6
7
8
9
next ›
last »