Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy Requirements
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 12:16pm
Smart homes
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
human-centric software engineering
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
edge computing applications
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
aging
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
resilience
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
medical treatment process
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
HIPAA
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
Accountability Solution
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 12:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
biblio
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
privacy-respecting Deep Packet Inspection
network payloads
organizational policies
passive proxying
Perfect Forward Secrecy
policy based framework
privacy
Privacy Policies
Privacy Requirements
privacy-aware techniques
Network connections
pubcrawl
Scalability
security solutions
semantic technologies
telecommunication traffic
TLS 1.3
unencrypted payloads
user access privileges
decryption
access decision
active proxying
attribute based access control
Attribute-based Access Control (ABAC)
big-data problem
computer network security
critical requirement
Cryptography
data privacy
Access Control
deep packet inspection
DPI analysis
DPI tools
fully encrypted data-transfer
high velocity network traffic
Human behavior
internet
malicious activity
biblio
Model-Based Assessment for Balancing Privacy Requirements and Operational Capabilities in the Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Resiliency
optimal balancing algorithm
policy-based governance
power generation protection
power system security
privacy
Privacy Requirements
privacy-aware data processing
privacy-aware data storage
pubcrawl
resilience
operational requirement
Scalability
security
Smart Grid
Smart Grid Privacy
Smart Grids
Smart Metering
smart power grids
University of Southern California
USC microgrid
Human behavior
billing
collaboration
common high-level use case
composability
data privacy
demand response
distributed power generation
forward mapping privacy
Heterogeneous systems
approximation theory
Human Factors
Load Curtailment
Mathematical model
merging
Metrics
model-based assessment
numeric approximation
Numerical models
operational capabilities
biblio
A Holistic Approach for Privacy Protection in E-Government
Submitted by grigby1 on Thu, 05/24/2018 - 11:32am
collaboration
Policy
Policy Based Governance
policy-based governance
privacy by design
Privacy Enforcement
Privacy Level Agreement
Privacy Requirements
pubcrawl