Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
accountability
biblio
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
electronic health record software
Software and Application Security
Science of Security
science
nonrepudiation
medical devices
logging mechanism
Healthcare
health care
foundations
accountability
Database and Storage Security
Database Activity Monitoring
cyber security
CPS Domains
case study
black-box testing
audit
ACM CCS
ACM CCS
Cyber Security
Database Activity Monitoring
Database and Storage Security
Software and Application Security
biblio
Open vs. Closed Systems for Accountability
Submitted by adj on Wed, 09/17/2014 - 6:30pm
Systems Engineering
Science of Security
CPS Technologies
Foundations
accountability
ACM CCS
CPS Technologies
Database and Storage Security
foundations
identity
Information Accountability and Usage Control
Science of Security
systems engineering
utility
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
file
Open vs. Closed Systems for Accountability
Submitted by adj on Tue, 06/03/2014 - 5:35pm. Contributors:
Joan Feigenbaum
Aaron D. Jaggard
Rebecca N. Wright
accountability
anonymity
identity
open systems
utility theory
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Accountability and Identifiability
Submitted by Katie Dey on Wed, 12/19/2012 - 2:31pm. Contributors:
Joan Feigenbaum
Aaron D. Jaggard
Rebecca N. Wright
ABSTRACT
SaTC Posters
accountability
definitions
identity
Rutgers University
tradeoffs
1018557
SaTC PI Meeting 2012
Academia
Poster
profile
Anupam Datta
Foundations
accountability
Compositional Security
Privacy Foundations
Security Foundations
file
Deterring Unauthorized Access by Insiders: Raising Perceptions of Accountability in End Users Through User Interface Artifacts
Submitted by Katie Dey on Mon, 11/12/2012 - 11:11am. Contributor:
Anthony Vance
ABSTRACT
SaTC Posters
user interface design
unauthorized access
insider abuse
information security
identifiability
evaluation
Brigham Young University
accountability
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3
4