Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Implementation of security framework for multiple web applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
MD5
web services
web applications
single sign-on
Servers
security of data
security framework implementation
proxy signature
OpenID
authentication
Informatics
identity management technique
identity management system
encryption
credential problems
Computers
authorization
authentication server
biblio
Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
Intelligent Transportation Systems
vehicles
vehicle-to-vehicle/infrastructure
V2X communications
radio access networks
proximity services
Protocols
ProSe
next generation cellular networks
LTE core network
LTE based device-to-device
LTE
Logic gates
ITS
4G mobile communication
dynamic clusters
distributed ProSe architecture
delays
D2D communications
D2D
CVN core network
CVN
Clustering algorithms
clustering
cellular vehicular networks
cellular radio
authorization
advanced 4G networks
biblio
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
Aggregates
authentication
authentication authorization and accounting management mechanisms
authorisation
authorization
C-BAS
certificate-based AAA architecture
computer architecture
computer network management
Databases
patchy AAA infrastructure
Public key
robust AAA infrastructure
SDN experimentation facilities
Servers
software defined networking
biblio
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
EUDAT collaborative data infrastructure
Unicore project
Servers
SAML
Portals
PKI
Open ID
OAuth
groupware
federated identity management
federated authentication
AAI
EUDAT
distributed data infrastructure
credential translation
Contrail project
Communities
Bridges
authorization
authorisation
authentication and authorisation infrastructure
authentication
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
ISO/IEC/IEEE International Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Part 1AR: Secure device identity
Submitted by BrandonB on Fri, 05/01/2015 - 8:57am
Local area networks
X.509
security
secure device identifier
secure association
port-based network access control
PKI
network security
Metropolitan area networks
MANs
MAC security
Access Control
LANs
ISO standards
information technology
IEEE standards
IEC standards
certificate
authorization
authentication
Access controls
biblio
Proposal of a secure, deployable and transparent middleware for Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
Internet of Things
Zigbee
Transparent Middleware
TLS
smart objects
security of data
security architecture
security
secure middleware
protection measures
OAuth
middleware
IoT transparent middleware
AES
electronic data interchange
deployable middleware
data privacy
data integrity
data exchange service privacy
data exchange service integrity
data exchange service confidentiality
data exchange service authenticity
computer architecture
authorization
authentication
« first
‹ previous
…
6
7
8
9
10
11
12
13
14