Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity
biblio
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Submitted by grigby1 on Fri, 09/15/2017 - 10:02am
ACORN
AEAD
authenticated encryption
Caesar
collision
integrity
Lightweight Ciphers
mac
pubcrawl
Resiliency
stream cipher
symmetric encryption
biblio
Secure DSR Routing Protocol Based on Homomorphic Digital Signature
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
detection
Dsr
Homomorphic
integrity
MANET
manet attack prevention
pubcrawl
security
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 11:41am
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Integrity of a common operating picture in military situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:41am
Microwave integrated circuits
Wireless communication
Weight measurement
situational awareness information
situational awareness
military situational awareness
military operations
military computing
military command and control
C2
integrity
Decision Making
COP integrity
common operating picture integrity
Common Operating Picture
command and control systems
command and control
Cameras
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 7:44am
SOAPAction spoofing
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
schema validation
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
Information services
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
API
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
file
Low-Cost, Embedded Safety-Critical Systems
Submitted by gjbalas on Thu, 02/20/2014 - 11:06am. Contributors:
Mats Heimdahl
Sanjai Rayadurgam
Peter Selier
Gary Balas
CPS Domains
Automotive
Transportation
Validation and Verification
CPS Technologies
Foundations
integrity
Reliability
CFP Submissions
CFP Paper Submissions
2014 National Workshop on Transportation CPS
2014
Academia
Position Paper
Publications
« first
‹ previous
1
2
3
4
5
6