Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
contracts
biblio
Blockchain Based Secure Package Delivery via Ridesharing
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
security
PBFT
Peer-to-peer computing
possible data leakage
promising service
pubcrawl
Ridesharing
ridesharing systems
Scalability
package delivery
Servers
Tamper resistance
tamper-resistance property
telecommunication security
time 15.0 s to 10.0 min
Transportation
vehicle occupancy
vehicles
delivery service
Blockchain based
blockchain efficiency
blockchain secured ridesharing delivery system
central controller
contracts
Cryptography
data privacy
delays
blockchain
electronic money
fault tolerance
fault tolerant computing
hash-oriented practical byzantine fault tolerance based consensus algorithm
Human behavior
Human Factors
Metrics
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT
SxC framework
Software
Smart homes
Smart Home
security-by-contract
security
Scalability
Resiliency
pubcrawl
IoT systems
IoT devices
IoT device contract
Cloud Computing
Internet of Things
human beings lives
home automation
fog computing distributed paradigm
Fog Computing and Security
Fog computing
edge computing
contracts
contract-policy matching
consolidated reality
computer network security
biblio
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
Bandwidth
public administration
private blockchain
military organizations
military agencies
government agencies
distributed CDN Schema
Content Delivery Network(CDN)
content delivery network
CDN system
DDoS attack mitigation
resilience
contracts
military computing
Computer crime
Companies
internet
Metrics
composability
pubcrawl
Human behavior
Cryptography
Servers
IP networks
distributed denial of service attacks
ddos mitigation
computer network security
biblio
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
contracts
PKI Trust Models
trust experience
smart contract-assisted public key infrastructure
smart contract-assisted PKI extension
PKI
dynamic trust state
dynamic trust network
dynamic trust management
Decentralized Trust
CT
certification
certificate transparency
certificate authority
Browsers
Scalability
public key cryptography
Public key
digital signatures
Policy
Ecosystems
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 11:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »