Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy Based Governance
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
WSN technology
wireless sensor networks
telecommunication security
Security Properties
security breaches
Security analysis
security
secure transmissions
safe transmissions
real-time communications
pubcrawl
protocol verification
analyzed protocols
policy-based governance
Policy Based Governance
industrial domains
formal verification
Cryptographic Protocols
concerns security aspects
concerns improved guarantees
Compositionality
composability
complex networked control systems
collaboration
biblio
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
witness functions
Waste materials
telecommunication security
security vulnerability
security of data
security
Reliability
pubcrawl
protocol verification
collaboration
policy-based governance
Policy Based Governance
Needham-Schroeder symmetric-key protocol
formal verification
encryption
Cryptographic Protocols
Compositionality
composability
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
Making IoT security policies relevant, inclusive and practical for people: A multi-dimensional method
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
collaboration
deliberation
design
IoT security
Policy Based Governance
policy-based governance
pubcrawl
simulation
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
biblio
Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
Blakley's scheme
collaboration
computer network security
discretionary security policy
forbidden information channels
matrix of access.
Policy Based Governance
policy-based governance
polynomials
pubcrawl
secret sharing scheme
Shamir's scheme
sharing secretscheme
telecommunication channels
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
A Method of Conflict Detection for Security Policy Based on B+ Tree
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
network security
trees (mathematics)
tree data structures
security policy
security
Redundancy
pubcrawl
Protocols
policy-based governance
policy conflict
Policy Based Governance
B+ tree
network management system
Libraries
Indexes
detection algorithms
conflict detection
computer network security
computer network management
Communication networks
collaboration
B+ tree-based security policy conflict detection method
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »