Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identity management
biblio
Trustful: A Decentralized Public Key Infrastructure and Identity Management System
Submitted by grigby1 on Thu, 05/20/2021 - 11:36am
internet
web of trust
sockets
smart contracts
smart contract
security
resilience
Public key
pubcrawl
PKI
PKI Trust Models
identity management systems
Identity management
decentralized PKI
composability
blockchain
Metrics
Human behavior
Scalability
Resiliency
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 1:25pm
IOTA Tangle
web of trust approach
Trusted Computing
trusted authority
Trust Management Framework
Trust framework
sensors
self sovereign identity
self sovereign identities
Scalability
Resiliency
resilience
quantifiable trust
pubcrawl
proprietary environments
permissionless environment
web of trust
IoT devices
Internet of Things devices
Internet of Things
IDMS
identity management system
Identity management
Human behavior
enclosed environments
DLT's network
Distributed Ledger Technology
Distributed databases
decentralized Identity
automatic trust rating
authorisation
arbitrary identities
biblio
Research on Decentralized Identity and Access Management Model Based on the OIDC Protocol
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
Identity management
unified authentication service
Scalability
Resiliency
resilience
reliable authentication service
pubcrawl
personal security information
personal information security problems
personal identity access management model
OIDC protocol
message authentication
access management application cluster
identity information
Human behavior
encryption services
decentralized identity authentication
Decentralized ID
Cryptographic Protocols
certificate authority
authorisation
authentication rules
application system
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Private Identity-Based Encryption For Key Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
Cancer
computer science
encryption
Human behavior
Identity management
Identity-based encryption
key management
Lung
Private Identity
Protocols
pubcrawl
resilience
Resiliency
Scalability
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
IdM
uPort
SSI ecosystem
SSI
Sovrin
Self-Sovereign Identity
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Principles of SSI
numerous governing principles
IDM systems
IDM system
Analytical models
identity management system
Identity management
Human behavior
federated identity management
Ecosystems
distributed ledger
digital transformation
digital services
Digital identity
digital form
data privacy
Cryptography
blockchain enabled privacy preserving identity management systems
blockchain
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »