Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Design method for developing a Mobile Engineering-Application Middleware (MEAM)
Submitted by BrandonB on Wed, 05/06/2015 - 1:12pm
Business
Design Method
Design methodology
IT environment
MEAM
Measurement
middleware
Mobile Application
Mobile communication
mobile computing
Mobile Engineering Application Middleware
mobile engineering-application middleware
security
Systematics
touchscreen-based handling
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 1:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature
biblio
A Credential Store for Multi-tenant Science Gateways
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
middleware tier
user interfacing tier
user interfaces
Servers
security
Science Gateways
resource tier
Portals
overlay cyber infrastructure
OA4MP
multitenant science gateways
Apache Airavata
middleware
Logic gates
grid computing
gateway middleware
credential store
computational grids
Communities
clouds
Cloud Computing
authentication
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 12:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
BIOS integrity an advanced persistent threat
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
information security spectrum
Vectors
Trusted Computing
Stuxnet
Servers
security
Roots of Trust (RoTs)
Roots of Trust
Original Equipment Manufacturer (OEM)
Organizations
Iranian Nuclear Power Plant
advanced persistent threat
Hardware
firmware
data integrity
computer network security
BIOS Integrity Measurement
BIOS integrity
Biological system modeling
basic input output system
Advanced Persistent Threat (APT)
biblio
A Secure Effective Key Management Scheme for Dynamic Access Control in a Large Leaf Class Hierarchy
Submitted by BrandonB on Wed, 05/06/2015 - 12:51pm
Access Control
Hash Function
Hierarchy
key management
security
Symmetric-key cryptosystem
biblio
Provably Secure Group Key Management Approach Based upon Hyper-Sphere
Submitted by BrandonB on Wed, 05/06/2015 - 12:49pm
PRF
Vectors
security
secure group communication systems
robust group key management approach
re-keying messages
random number
public key cryptography
pseudorandom function assumption
pseudo-random function (PRF)
provably secure group key management approach
provable security
Protocols
private key cryptography
Algorithm design and analysis
member private point
massive membership change
key management
hyper-sphere theory
hyper-sphere
group controller
Group communication
GC
Galois fields
Educational institutions
Concrete
central point
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 12:47pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
« first
‹ previous
…
415
416
417
418
419
420
421
422
423
…
next ›
last »