Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
rights management system
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
internet
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
Access Control
Human Factors
Human behavior
hardware-software collaboration
Hardware
groupware
eTRON architecture
digital token
Digital rights management
Cryptography
computer architecture
authorisation
authentication
asymmetric cryptography
APIs
API
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
Secure Information Sharing among Autonomous Vehicles in NDN
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
named data networking
wireless environment
vehicular data authentication
vehicular ad hoc networks
vehicle tracking
vehicle names
telecommunication security
security
secure information sharing
secure data sharing
robust decisions
Resiliency
Raspberry Pi
pubcrawl
pseudonym scheme
NDN
Accidents
Mobile communication
mobile ad-hoc environment
Metrics
IP networks
Internet of Vehicles
Internet architecture
internet
Human Factors
Human behavior
Data Security
Data models
data delivery
cyber physical systems
autonomous vehicular network
autonomous vehicles
biblio
ICN-based open, distributed data market place for connected vehicles: Challenges and research directions
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
ICN-based open distributed data market place
wireless environments
vehicular ad hoc networks
security
Resiliency
pubcrawl
Metrics
interoperability
Internet of Vehicles
Internet of Things
internet
infrastructure environments
information centric networking paradigm
ad hoc environment
Human Factors
Human behavior
heterogeneous IoT ecosystem
harmonized architectural design
domain-specific solutions
Distributed databases
cyber physical systems
Connected Vehicle
batteries
Automotive engineering
automobiles
biblio
Adaptable Safety and Security in V2X Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
security threats
performance limitation threats
pubcrawl
Resiliency
road safety
road traffic
Roads
Safety
security
network conditions
simple V2V highway scenario
telecommunication security
telecommunication traffic
traffic efficiency
V2X systems
vehicular ad hoc networks
Wireless communications
adaptability
mobile computing
Metrics
maximum safety
Internet of Vehicles
internet
infotainment
Human Factors
Human behavior
dynamic adaptability approach
cyber physical systems
connected vehicles
Brakes
automobiles
authentication
adaptive safety/security approach
biblio
Embedding of MRC in TM to increase the security for IoT technologies
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
wireless sensor networks
Wireless communication
TM (trust management)
sensors
security Algorithm
security
Resiliency
pubcrawl
MRC (maximum ratio diversity)
Metrics
IoT (internet of things) system
internet
embedded systems
diversity reception
composability
Application Layer
biblio
Keyword-driven security test automation of Customer Edge Switching (CES) architecture
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
pubcrawl
automated test framework
automation
CES protocol designers
computer architecture
computer network security
customer edge switching architecture
internet
Internet architecture
keyword driven security test automation
keyword-driven testing
multidomain communications
protocol validation
Protocols
testing
Resiliency
Resilient Security Architectures
robot framework
robots
security
security threats
signalling protocols
Software
STRIDE analysis
telecommunication equipment testing
telecommunication traffic
test automation
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
« first
‹ previous
…
70
71
72
73
74
75
76
77
78
…
next ›
last »