Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal security analysis
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
compromised machine
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
Stephen-Davidowitz
nontrivial combining nonmonotonic formula
nonmonotonic access structure
non-monotonic access structure
multiauthority nonmonotonic KP-ABE scheme
multiauthority key-policy ABE scheme
multiauthority ABE scheme
Multi-authority
MA-KP-ABE-CRF system
ex-filtration
cryptographic reverse firewall concept
cryptographic reverse firewall
CRF security protection
firewalls
Charm library
attribute-based encryption field
attribute-based encryption
formal security analysis
Resists
Firewalls (computing)
pubcrawl
Resiliency
Protocols
secret keys
Access Control
encryption
Cryptography
Scalability
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS