Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
IoT services collaborations
telecommunication security
security policies
Routing
route events
Resiliency
publish/subscribe paradigm
Publish/Subscribe
pubcrawl
Niobium
multicast IoT service interactions
middleware
loose coupling
Logic gates
IoT services communication infrastructure
Access Control
IoT service communication infrastructure
IoT Service
Internet of Things
indirect IoT service interactions
Homomorphic encryption
event visibility
event producers
event consumers
encryption
cross-layer security solution
Cross Layer Security
composability
authorization
anonymous IoT service interactions
biblio
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
decentralized CP-ABE
Software Architecture
security scalability
security degradations
Scalability
revocation
pubcrawl
multi-authority architecture
Multi-authority
group sharing applications
flexible access policies
encryption
Access Control
decentralized attribute-based encryption access control
data confidentiality
Cryptography
cryptographic method
computer architecture
Companies
cloud environment
Cloud Computing
authorization
attribute-based encryption
attribute revocation
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
identity management mechanisms
authentication
authorisation
authorization
communication protocols
Companies
data privacy
identifier
Identities of Things discussion group
identity
sensors
internet
Internet of Things
IoT
Kantara Initiative
name service
Object recognition
privacy
Protocols
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Identity access management for Multi-tier cloud infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 1:19pm
authentication
authorisation
authorization
centralized identity access management
Cloud Computing
computer architecture
green-thread process
IAM system
load balanced process
multitier cloud infrastructures
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »