Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
A Security-Enhanced Interoperability Middleware for the Internet of Things
Submitted by aekwall on Mon, 03/16/2020 - 10:35am
GHOST
Scalable Security
vendor
security-enhanced interoperability middleware
scalable solution
Safe-Guarding Home IoT Environments
Personalised Real-time Risk Control project
operational requirements
main features
IoT object abstraction layer
Internet of Things middleware
highly resilient solution
hardware platforms
security
generic object model
effective IoT platform
confidentiality
open systems
authorization
home automation
middleware
authentication
pubcrawl
Internet of Things
Scalability
security of data
biblio
Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
password
software program
scalable multifactor authentication method
legacy systems authentication
legacy systems
host oriented factor normalizing authentication resource
computer systems security
authentication model
two factor authentication
secure authentication
Multi-factor authentication
authorisation
radiofrequency identification
biometrics
authorization
security issues
Human Factors
biometrics (access control)
software maintenance
radio frequency identification
pubcrawl
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
biblio
Efficient Privacy-Preserving User Identity with Purpose-Based Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
identity management systems
Scalability
resilience
purpose-based encryption
pubcrawl
Protocols
privacy-preserving user identity
Privacy-preserving
Privacy Policies
privacy
PII
personal identifiable information
identity propagation
attribute-based encryption
Identity management
Human behavior
General Data Protection Regulation
federated identity management
Facebook
encryption
Data protection
Cryptography
cloud services
cloud environment
Cloud Computing
authorization
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
SOA Approach - Identity and Access Management for the Risk Management Platform
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
multilayered approach
User Management
taxes
tariffs
SOA approach
SOA
service-oriented architecture
security
Scalability
risk management system
Risk Management platform
risk management
resilience
pubcrawl
Protocols
access management
international trade
information exchange
imports
Identity management
Human behavior
goods transit
goods dispatch data processing
export
duties
decoupled microservices
customs administrations
checking prohibitions
authorization
authentication
biblio
A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy
Submitted by grigby1 on Tue, 01/21/2020 - 11:32am
Level of Assurance
user credentials
Trusted Computing
service security
Scalability
Resiliency
resilience
remote identity providers
pubcrawl
policy-based governance
NIST
Metrics
message authentication
LoA
access control decisions
Information Assurance
Human behavior
FIM
federated identity management
composability
collaboration
central proxy
authorization
authorisation
authentication and authorization infrastructure
authentication
assurance level
assurance information
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »