Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
A Multi-Level Security Access Control Framework for Cross-Domain Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
Ubiquitous Computing Security
target domain
simulation
secure interactions
Scalability
Resiliency
pubcrawl
Organizations
network domains
multilevel security protection
multilevel security access control framework
multilevel mapping method
Multi-Level Security
Access Control
mapping method
intradomains
inter-domain mapping
information science
Human Factors
Human behavior
hierarchical access control structures
Data protection
cross-domain networks
cross-domain
Conferences
Computational modeling
authorisation
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
Hardware support for embedded operating system security
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
hardware monitor
attack
composability
Computer crime
Context
Data protection
defense
embedded operating system security
embedded OS security
Embedded System
embedded systems
field programmable gate arrays
FPGA prototype
FPGA-based prototype implementation
Hardware
hardware support
Hardware-based monitoring
Internet-connected embedded systems
Metrics
Monitoring
monitoring graph
operating system
operating systems (computers)
pubcrawl
Registers
remote hacking attacks
Resiliency
security
software-based protection mechanisms
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
biblio
Secure and resilient scheme for data protection in unattended wireless sensor networks
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
wireless sensor networks
sensors
Security analysis
Resilient Security Architectures
Resiliency
pubcrawl
Mobile communication
Fragmentation
Data protection
Data dispersal
Cryptography
authentication
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
The Influence of Data Protection and Privacy Frameworks on the Design of Learning Analytics Systems
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Security by Default
collaboration
Data protection
data protection by default
data protection by design
learning analytics
learning analytics process requirements
learning analytics systems design
personal information
Policy
policy-based governance
privacy by design
privacy frameworks
pubcrawl
biblio
A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
patient treatment
hybrid real-time cryptography algorithm
innovative technology
lightweight wearable medical devices
Medical services
medical treatment
Metrics
patient confidentiality
patient monitoring
Human behavior
privacy
pubcrawl
real-time health monitoring
remote health monitoring system
Resiliency
secure cryptography algorithm
smart wearable medical devices
Data protection
bioinformatics
biomedical equipment
chaos
Cloud Computing
cloud-based healthcare service protection
computerised monitoring
contemporary health care management
Cryptography
Algorithm design and analysis
deterministic chaos method
DNA
DNA cryptography
genomic encryptions
genomics
health activities
health care
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »