Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial applications
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
A Middleware Framework to Address Security Issues in Integrated Multisystem Applications
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
open systems
Systems-of-Systems
Systems Integration
smart cities
sensors
security of data
security attacks
security aspects
security
Resiliency
pubcrawl
production engineering computing
Access Control
multisystem integration
middleware
Metrics
manufacturing systems
interoperability
integrated multisystem applications
industrial applications
Human behavior
composability
actuators
actuator security
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations