Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 8:40am
on-demand multiprovider multidomain heterogeneous cloud infrastructure services
heterogeneous multiprovider multicloud environment
ICAF
ICFF
integration issue
intercloud architecture framework
intercloud federation framework
intercloud federation scenarios
interoperability issue
heterogeneous multiprovider intercloud environment
operating systems (computers)
outsourcing
provider-side federation
resource brokering
resource outsourcing
Software Architecture
Trusted Computing
trusted third party entities
customer-side federation
authorisation
authorisation infrastructure
authorization
cloud based services
Cloud Computing
cloud service broker
CSB
customer campus
architecture patterns
distributed federated multidomain authentication
dynamic trust relations
enterprise infrastructure
federated access control model
federated identity management model
federated identity management scenarios
FIDM model
heterogeneous intercloud environment
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
biblio
The design of the secure transmission and authorization management system based on RBAC
Submitted by BrandonB on Mon, 05/04/2015 - 2:54pm
group authority
SSL protocol
server-side digital certificate
Rose-based access control
RBACt
RBAC model
public key infrastructure
public key cryptography
PKI principles
PKI
MVC model
internet
identity authentication
Abstracts
Electronic government
E-Government
distributed authority management
Digital certificate
data secure transmission
client-side digital certificate
certificate authority system
centralized authority
authorization management system
authorization
authorisation
Aspect-oriented programming
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:54pm
Internet of Things
trusted host
symmetric cryptography
smart objects
resource-constrained node
Protocols
protocol
performance evaluation
Peer-to-peer computing
authentication
Face
delegated authenticated authorization
Cryptographic Protocols
cross-domain setting
constrained environments
client authentication
authorization
biblio
New paradigms for access control in constrained environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:53pm
Internet of Things
tamper-proof secret keys
standard compliant security protocols
Servers
SCADA
Reliability
PUF
private key cryptography
physical unclonable functions
Oscillators
open systems
mobile computing
message authentication
IoT
interoperability
Access Control
identity management framework
field programmable gate arrays
eSIM
embedded subscriber identity module
constrained resource server
constrained M2M devices
cellular connectivity
Building automation
authorization scheme
authorization
authorisation
authentication
access management framework
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »