Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
zero trust
biblio
Real Identity Based Access Control Technology under Zero Trust Architecture
Submitted by grigby1 on Tue, 12/21/2021 - 3:21pm
Admission control
collaboration
Human behavior
Human Factors
identity authentication
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
zero trust
Zero trust architecture
biblio
Power IoT Security Protection Architecture Based on Zero Trust Framework
Submitted by grigby1 on Tue, 12/21/2021 - 3:21pm
Internet of Things
zero trust
Scalability
Resiliency
resilience
pubcrawl
privacy
POWER IO
policy-based governance
Internet security
Network Security Architecture
Human Factors
Human behavior
dynamic access control
Cryptography
Conferences
collaboration
Business
authentication
biblio
Performance Analysis of Zero-Trust Multi-Cloud
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Performance analysis
zero trust networking
zero trust
testing
sidecar proxy
Service Mesh
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Acoustic Fingerprints
multi cloud
Kubernetes
Istio
Human Factors
Human behavior
Cryptography
Conferences
collaboration
codes
Cloud Computing
biblio
Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
OpenFlow
zero-trust
zero trust
telecommunication traffic
Scalability
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
Access Control
network security
identity authentication
Human Factors
Human behavior
equipment portrait
computer network reliability
computer architecture
collaboration
authentication
biblio
Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Power measurement
zero trust
Web and internet services
Smart Grids
security protection
Scalability
Resiliency
resilience
pubcrawl
power systems
Power Mobile Interconnection
Computing Theory
policy-based governance
Human Factors
Human behavior
dynamic access control
Couplings
Continuous Trust Evaluation
Complexity theory
complex networks
collaboration
trust
biblio
The Zero Trust Security Platform for Data Trusteeship
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Indexes
zero trust
trusted platform modules
sensitivity analysis
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Peer-to-peer computing
information security
Acoustic Fingerprints
Human Factors
Human behavior
encryption
Computers
collaboration
Cloud Computing
ciphertext index
Ciphers
attribute-based encryption
biblio
Dynamic Access Control Technology Based on Zero-Trust Light Verification Network Model
Submitted by grigby1 on Tue, 12/21/2021 - 3:19pm
micro-segmentation
Zero trust policy
zero trust
usability
Technical management
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
Acoustic Fingerprints
lighted verification
Inspection
Human Factors
Human behavior
dynamic access control
Computational modeling
collaboration
Cloud Computing
Access Control
biblio
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation
Submitted by grigby1 on Tue, 12/21/2021 - 3:19pm
Protocols
zero trust
User Managed Access
Standards organizations
Semantics
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Acoustic Fingerprints
policy-based governance
Organizations
Identity federation
Human Factors
Human behavior
Conferences
collaboration
authorization
Access controls
biblio
Complex Strategy against Supply Chain Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 12:35pm
pubcrawl
zero trust
Zero day attacks
supply chains
Supply Chain
Software measurement
Software
security operation centre
Resiliency
resilience
army
Organizations
Metrics
History
defense
cyber-attack
Computer crime
composability
Communication Systems
communication and information systems protection
biblio
Securing Trajectory based Operations Through a Zero Trust Framework in the NAS
Submitted by grigby1 on Thu, 03/04/2021 - 3:07pm
TBO infrastructure
network perimeter
operating costs
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
strong boundary security protections
national airspace system
TBO objectives
time-based management data
tool availability
trajectory based operations
verify approach
zero trust
zero trust framework
ZTF theory
FAA systems
aerospace computing
air traffic control
aircraft communication
authorisation
boundary protections
castle-moat approach
critical data
ever-evolving threat sophistication
access network data
FAA Telecommunications Infrastructure network
Human Factors
hybrid ZTX approach
Insider Threats
internal network devices
NAS Zero Trust
NAS.ZTF
« first
‹ previous
1
2
3
4
5
next ›
last »