Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Scalability
zero trust
usage control
Smart homes
trust
ABAC
Prototypes
authorization
privacy
computer architecture
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
IoT
Monitoring
Internet of Things
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
IMPACT: A Trust Model for Human-Agent Teaming
Submitted by aekwall on Mon, 02/01/2021 - 11:39am
IMPACT model
Weapons
unmanned vehicle
trust
Task Analysis
target engagement
remotely operated vehicles
pubcrawl
Predictive models
multi-agent systems
large scale joint exercise controlling multiple unmanned vehicles
intelligent adaptive decision aid
Adaptation models
human-autonomy interaction
human-agent teaming
human trust
human partners
Human behavior
Decision Making
collaborative team
collaboration
autonomous agents
authorization
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 11:27am
Traffic Management
Intelligent Data and Security
Intelligent Data Security
sustainable adoption
Security Classification
security approaches
multitier ITS security framework
ITS trust challenges
coherent reference architecture
business intelligence development
Big Data security frameworks
reference architecture
big data technologies
Intelligent Transportation Systems
Intelligent Transportation System
Scalability
Compositionality
Logic gates
Data processing
authentication
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Trusted Computing
Internet of Things
Big Data
authorization
biblio
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
mobile computing
telecommunication security
security
Resiliency
resilience
pubcrawl
policy based security
policy based approach
ns 2
mobile nodes
authorization
mobile ad hoc networks
mobile ad hoc network
Metrics
messages dissemination
MANETs
manet privacy
data privacy
Compositionality
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »