Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data breaches
file
Bhagavatula_How_do_People_Cranor.pdf
Submitted by Jamie Presken on Mon, 07/13/2020 - 1:42pm
data breaches
passwords
security behavior
biblio
(How) Do people change their passwords after a breach?
Submitted by Jamie Presken on Mon, 07/13/2020 - 1:42pm
data breaches
passwords
security behavior
CMU
2020: July
biblio
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
marketplaces
US Navy
Tor
surface Web
sophisticated social engineering attacks
security of data
pubcrawl
PII
OWL Cybersecurity
OPSEC
operational security
open internet
military operations
military computing
anonymity
leaked data
internet
Human Factors
Human behavior
deep web
deanonymization
data sale
data leaks
data breaches
dark Web marketplaces
dark web
breached information
armed forces
biblio
An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
SDN/NFV-enabled architecture
NFV-enabled system
personally identifiable information detector
personally identifiable information leaks detection
privacy
privacy leaks
pubcrawl
resilience
Resiliency
SDN controllers
NFV MANO
Servers
social networking
software defined networking
software defined networking paradigm
software-based solutions
traffic intensity
unintended data disclosure
virtualisation
virtualization privacy
Human Factors
composability
computer architecture
computer network security
Data Breach
data breaches
data privacy
data-intensive nature
hardware-specific implementation
Human behavior
Cloud Computing
internet
leak detection
leak detection systems
load balancer
Measurement
Metrics
Middleboxes
network function virtualization
network traffic
biblio
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
patient records
electronic health records
health record
Knowledge Graph (Ontology)
medical organization
medical providers
Medical services
Ontologies
Organizations
patient centric approach
patient data
Electronic Health Record (EHR)
safe cloud-based EHR management
secure access delegation
secure cloud-based EHR management
Semantic Web
service management
Human behavior
pubcrawl
collaboration
policy-based governance
Attribute Based Encryption (ABE)
Scalability
authorisation
Cryptography
encryption
Access Control
data privacy
Access Broker
Attribute Based Access Control (ABAC)
attribute based encryption
Cloud Computing
authorization delegation mechanism
authorization models
cloud based EHR systems
cloud storage
cloud-based EHRs access authority
cloud-based electronic medical records services
data access authorization
data breaches
easy cloud-based EHR management
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege