Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
user access control
typical IoT system model
middleware layer
IoT system architecture
IoT gateway
device data
attribute based access control
IoT middleware
data handling
internetworking
middleware
Logic gates
authentication
policy-based governance
security
Human behavior
data encryption
IoT devices
Internet of Things
attribute-based encryption
Cryptography
authorization
authorisation
Access Control
ciphertext-policy attribute-based encryption
Scalability
computer network security
IoT
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware
Submitted by grigby1 on Thu, 07/30/2020 - 2:14pm
IoT devices
security
secure IoT system
REST API
Resiliency
resilience
representational state transfer API
pubcrawl
middleware
Metrics
Logic gates
IoT systems
IoT security
application program interfaces
IoT applications
IoT
Internet of Things
Human Factors
Human behavior
fairly disruptive technology
data privacy
computer network security
composability
Cloud Computing
authorization
authentication
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
data user
user attribute
Servers
searchable CP-ABE scheme
searchable attribute-based encryption schemes
Scalability
revocation stage
Public key
pubcrawl
provable security
policy-based governance
multi-keyword search
encryption
attribute revocation
data privacy
Cryptography
CP-ABE
collaboration
cloud service provider
cloud computing environment
Cloud Computing
ciphertext information
authorization server
authorization information
authorization
authorisation
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Authenticate Users with Their Work on the Internet
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
message authentication
Web pages
user authentication
secret password
Resiliency
resilience
remote information systems
remote access
pubcrawl
password
multifactor authentication
Metrics
authentication
Internet user
internet
Human Factors
Human behavior
History
Document Object Model
classification of text documents
Browsers
authorization
authorisation
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »