Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
zero trust
biblio
Sugar: Secure GPU Acceleration in Web Browsers
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
GPU acceleration
Human behavior
Human Factors
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
Systems Security
Virtualization
Web browser
zero trust
biblio
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
composability
data integrity
fine-grained access control
Human behavior
Human Factors
Metrics
policy-based governance
Outsourced Database Integrity
pubcrawl
query processing
resilience
Resiliency
Scalability
zero trust
biblio
Lattice-Based Zk-SNARKs from Square Span Programs
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
Human behavior
Human Factors
policy-based governance
Post-quantum
pubcrawl
resilience
Resiliency
Scalability
snark
zero trust
zero-knowledge
biblio
Hardware Security at the Limit: Nuclear Verification and Arms Control
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
Human behavior
Human Factors
nuclear arms control
nuclear verification
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
vintage verification
zero trust
zero-knowledge proof
biblio
Fine-Grained Big Data Security Method Based on Zero Trust Model
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
fine-grained big data security method
zero trust model
zero trust
security of data
Scalability
risky data access
Resiliency
resilience
pubcrawl
policy-based governance
legacy security technologies
Human Factors
Human behavior
fine-grained data access authentication control
Big Data
drugs
data security risks
data security domain
Data Security
data processing capacity
data privacy
data access audit
Conferences
big data usage
Big Data technology
big data security control
big data environment
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
RiskPol : A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
pubcrawl
attribute based access control
attribute forgery
attribution
composability
Human behavior
human-in-the-loop security center paradigm
Metrics
policy bypassing
risk management
zero trust
« first
‹ previous
1
2
3
4
5