Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XML
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
An Intrusion Tolerance Scheme for a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
malicious activity
XML
Wireless communication
transaction serializability
transaction processing
transaction dependency graph
subtransactions
serializability
security of data
security
Safety
running system serialization
Resiliency
pubcrawl
processing node
malicious transactions
CDC
intrusion tolerance scheme
intrusion tolerance
graph theory
estimation
dependency
Decision Making
databases environment cloud
Databases
database management systems
Data models
concurrent access
composability
Cloud of databases environment
Cloud Computing
biblio
Best Practices for Web Applications to Improve Performance of QoS
Submitted by grigby1 on Tue, 10/03/2017 - 10:54am
Automated Response Actions
composability
middleware
pubcrawl
QoS
Resiliency
service oriented architecture
SOAP
UDDI
web services
XML
biblio
Minimization of Tree Pattern Queries
Submitted by grigby1 on Mon, 06/05/2017 - 11:28am
collaboration
complexity
data deletion
graph databases
Human behavior
optimization
pubcrawl
Scalability
tree patterns
trees
XML
XPath
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 1:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
biblio
WiMesh: A Tool for the Performance Evaluation of Multi-Radio Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:51am
software tool
XML configuration
XML
wireless mesh networks
WiMesh
Topology
Throughput
telecommunication computing
telecommunication channels
Channel allocation
research community
performance evaluation
ns-3 simulations
network topology
multiradio wireless mesh networks
Libraries
channel assignment
« first
‹ previous
1
2
3