Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identity management
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 12:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
A policy-based identity management schema for managing accesses in clouds
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
Access Control
authentication
Cloud Computing
Computational modeling
Identity management
Policy
Policy Mapping
pubcrawl
Reliability
Scalability
scalable
Scalable Security
security
Servers
user authentication
biblio
Blockchain-Assisted Information Distribution for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Access Control
authentication
composability
Compositionality
contracts
Human behavior
Human Factors
Identity management
internet
Metrics
Provenance
provenance verification
pubcrawl
Public key
Resiliency
sensors
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
biblio
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments
Submitted by grigby1 on Tue, 06/27/2017 - 12:05pm
authentication
biometrics
Human behavior
Identity management
Metrics
Multi-server environments
pubcrawl
Resiliency
Scalability
Smart card
biblio
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices
Submitted by grigby1 on Tue, 06/27/2017 - 12:05pm
Cryptography
Human behavior
Identity management
key
Management
Metrics
mobile
privacy
pubcrawl
Resiliency
Scalability
security
security weaknesses
threshold
biblio
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Submitted by grigby1 on Tue, 06/27/2017 - 12:04pm
anonymity
anonymous communication
anonymous messaging
authentication
Human behavior
Identity management
Metrics
network accountability
online social networks
pubcrawl
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »