Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorization
biblio
A Trust Management Framework for Network Applications within an SDN Environment
Submitted by grigby1 on Wed, 05/09/2018 - 3:02pm
pubcrawl
Trusted Computing
Trust management
trust
software defined networking
security
SDN environment
SDN
Router Systems Security
Router Systems
Resiliency
resilience
Reliability
Aerospace electronics
Ports (Computers)
network resources
network behaviour
network applications
Metrics
control systems
computer network security
authorization
authorisation permissions
authorisation
authentication
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
Submitted by grigby1 on Mon, 03/19/2018 - 1:36pm
Identity-based encryption
storage management
shared data
security
secure file sharing system
Secure File Sharing
revocation
revocable-storage identity
Resiliency
resilience
reliable data sharing
Receivers
pubcrawl
Metrics
authorisation
Human behavior
encryption scheme
encryption
efficient revocation scheme
data sharing
Cryptography
cryptographically enhanced access control
composability
cloud storage
cloud server
Cloud Computing
authorization
biblio
Flexible Wildcard Searchable Encryption System
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
authorization
Cloud Computing
composability
encryption
Keyword search
metadata
multiple users
pubcrawl
Public key
Resiliency
searchable encryption
Top-k
user revocation
wildcard search
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
Attribute Based Access Control for Healthcare Resources
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
ABAC
Access Control
authorization
collaboration
FHIR
Policy
Policy Based Governance
policy-based governance
pubcrawl
rest
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »