Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity
biblio
Blockchain-based identity dicovery between heterogenous identity management systems
Submitted by grigby1 on Thu, 08/17/2023 - 3:39pm
Cryptography
Identity Management model
identity management framework
Identity Discovery
Dynamic Identity Management
distributed ledger
ethereum
smart contracts
identity management systems
Identity management
Organizations
privacy
identity
Scalability
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
blockchain
biblio
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information
Submitted by grigby1 on Tue, 10/12/2021 - 1:55pm
data privacy
Ecosystems
Human behavior
identity
internet
IoT
Mobile app
Mobile Applications
privacy
Privacy Policies
pubcrawl
Scalability
smart phones
social networking (online)
biblio
TrustedID: An Identity Management System Based on OpenID Connect Protocol
Submitted by grigby1 on Thu, 09/30/2021 - 10:11am
internet
Resiliency
security
Servers
smart phones
social networking (online)
standards
Human behavior
Human Factors
identity
resilience
LoA4
Metrics
Mobile Connect
multifactor authentication
Multi-factor authentication
openid connect
Protocols
pubcrawl
biblio
Hybrid Blockchain-Based Unification ID in Smart Environment
Submitted by grigby1 on Thu, 09/16/2021 - 10:12am
hyperledger
smart manufacturing
Resiliency
resilience
Repudiation
pubcrawl
Organizations
Metrics
identity
Access Control
Human behavior
History
ethereum
contracts
composability
blockchain
authentication
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
Identity and Access Control for Micro-services Based 5G NFV Platforms
Submitted by aekwall on Mon, 12/16/2019 - 1:30pm
authorization
Internet of Things
cyber-physical systems
pubcrawl
authentication
identity
resilience
5G
DevOps
JSON Web Token
Keycloak
micro-services
network services
NFV MANO
virtual network functions
controller area network security
biblio
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem
Submitted by aekwall on Mon, 05/20/2019 - 8:57am
Resiliency
Human behavior
pubcrawl
composability
Metrics
privacy
authentication
Internet of Things
identity
IoT Security 2018
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
1
2
next ›
last »