Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Access Control Audit and Traceability Forensics Technology Based on Blockchain
Submitted by grigby1 on Fri, 09/01/2023 - 3:20pm
metadata
security audit
Human Factors
blockchains
information forensics
Secure storage
Forensics
Access Control
maintenance engineering
computer security
blockchain
Big Data
authorization
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Personalized User Profiles-based Insider Threat Detection for Distributed File System
Submitted by grigby1 on Fri, 07/21/2023 - 2:16pm
Data Security
User profile
distributed file system
false trust
Resiliency
HDFS
File systems
Clustering algorithms
resilience
Measurement
Insider Threat Detection
estimation
Industries
authorization
Scalability
collaboration
policy-based governance
pubcrawl
machine learning
biblio
Fine-grained Encryption for Secure Research Data Sharing
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Scalability
encryption audits
Research Data
Data Reuse
attribute-based access control
symmetric searchable encryption
Costs
Resiliency
ciphertext-policy attribute-based encryption
automation
feature extraction
Compositionality
Prototypes
data privacy
authorization
privacy
resilience
Metrics
pubcrawl
security
biblio
Implementation Security Digital Signature Using Rivest Shamir Adleman (RSA) Algorithm As A Letter Validation And Distribution Validation System
Submitted by grigby1 on Thu, 06/29/2023 - 12:02pm
encryption
pubcrawl
resilience
Resiliency
Scalability
authentication
Cryptography
authorization
ISO standards
digital signatures
Distributed databases
digital signature
sustainable development
ISO 9126
Rivest Shamir Adleman (RSA)
biblio
CP-ABE with multi-Authorization Centers and Supporting Outsourcing Encryption and Decryption
Submitted by grigby1 on Fri, 05/19/2023 - 2:07pm
encryption
Cloud Computing
pubcrawl
policy-based governance
collaboration
Scalability
authorization
Protocols
Performance analysis
CP-ABE
Costs
encryption and decryption outsourcing
multi-authorization center
smart agriculture
two - party security calculation
biblio
Device Onboarding in Eclipse Arrowhead Using Power of Attorney Based Authorization
Submitted by grigby1 on Fri, 02/03/2023 - 5:26pm
cyber-physical systems
public key infrastructure (pki)
Power of Attorney (PoA)
Device onboarding
cyber-physical system (CPS)
Arrowhead framework
PKI Trust Models
automation
Employment
Internet of Things (IoT)
pubcrawl
Computational modeling
authorization
Scalability
performance evaluation
Conferences
Resiliency
resilience
Metrics
Human behavior
biblio
Evolving Role of PKI in Facilitating Trust
Submitted by grigby1 on Fri, 02/03/2023 - 5:25pm
privacy
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
authentication
Ecosystems
internet
Protocols
authorization
Public key
blockchains
PKI Trust Models
biblio
NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
Human Factors
authorization
Law
pubcrawl
Scalability
Metrics
Resiliency
machine learning
Insurance
network security
Companies
Costs
cybersecurity insurance
Ensemble Machine Learning
network security risk assessment
Security Risk Management
biblio
BYOZ: Protecting BYOD Through Zero Trust Network Security
Submitted by aekwall on Fri, 01/13/2023 - 3:52pm
network security
network security policy
BYOD
security policies
Continuous Authentication
zero trust
Pandemics
COVID-19
Companies
Human Factors
Resiliency
Metrics
Scalability
pubcrawl
authorization
authentication
privacy
biblio
A Dynamic Access Control Model Based on Game Theory for the Cloud
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
pubcrawl
game theoretic security
Nash Equilibrium
dynamic
Cloud Computing
Predictive Metrics
Access Control
game theory
Scalability
Measurement
Games
Conferences
probability
authorization
trust
Human Factors
Computational modeling
1
2
3
4
5
6
7
8
9
…
next ›
last »