Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical data
biblio
Securing Trajectory based Operations Through a Zero Trust Framework in the NAS
Submitted by grigby1 on Thu, 03/04/2021 - 2:07pm
TBO infrastructure
network perimeter
operating costs
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
strong boundary security protections
national airspace system
TBO objectives
time-based management data
tool availability
trajectory based operations
verify approach
zero trust
zero trust framework
ZTF theory
FAA systems
aerospace computing
air traffic control
aircraft communication
authorisation
boundary protections
castle-moat approach
critical data
ever-evolving threat sophistication
access network data
FAA Telecommunications Infrastructure network
Human Factors
hybrid ZTX approach
Insider Threats
internal network devices
NAS Zero Trust
NAS.ZTF
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 9:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency