Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
zero trust
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Trusted Connect Technology of Bioinformatics Authentication Cloud Platform Based on Point Set Topology Transformation Theory
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
Point Set Topology
zero trust
zero knowledge proof technology
trusted credentials
trusted connect technology
Trusted Computing
Topology
topological group transformation
Scalability
Resiliency
resilience
Public key
pubcrawl
policy-based governance
point set topology transformation theory
authentication
pattern recognition technology
Human Factors
Fractals
format conversion
Fingerprint recognition
feature data
digital coding
Cryptography
cloud platform
Cloud Computing
bioinformatics features
bioinformatics authentication cloud platform
bioinformatics
authorisation
biblio
A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
medical computing
ZK-SNARK
zero-knowledge proof
zero trust
zero knowledge argument of knowledge
verifiable computation
Trusted Computing
smart contracts
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
mutual trust
medical research
blockchain
machine learning
Human Factors
health data privacy
faces
distributed processing
Distributed databases
decentralized platform
data privacy
cybernetics
Cryptography
crowdsourcing platform
crowdsourcing
commitment schemes
commit-and-prove
blockchains
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Scalability
zero trust
usage control
Smart homes
trust
ABAC
Prototypes
authorization
privacy
computer architecture
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
IoT
Monitoring
Internet of Things
biblio
Design and Implementation of a Consensus Algorithm to build Zero Trust Model
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
distributed systems
zero trust model
zero trust
trust model
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Human Factors
Acoustic Fingerprints
distributed ledger
Distributed databases
data transfer
Data Security
Consensus algorithm
Conferences
Companies
blockchain
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
cloud computing environment
zero trust
Zero Trust Strategy
Trust Management System
trust management mechanisms
Subjective Trust
static trust relationship
Objective Trust
Incipient Technology
conceptual zero trust strategy
Data Breach
cloud service providers
Trusted Computing
Cloud Computing
Scalability
data integrity
data privacy
data confidentiality
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
security idea
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
network microsegmentation
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
data center network
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
zero trust
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
biblio
Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy
Submitted by aekwall on Mon, 01/20/2020 - 12:14pm
location-based services
zero trust
user privacy in the cloud
user location data
third-party application
supplementary servers
Scalability
Resiliency
pubcrawl
policy-based governance
mobile computing
Metrics
Access Control
location information
LBSs
Human Factors
dynamic multilevel policy
data privacy protection
data privacy
data partitioning
cloud-based locations
cloud service
Cloud Computing
authorisation
« first
‹ previous
1
2
3
4
5
next ›
last »