Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
open systems
biblio
Interoperability and lightweight security for simple IoT devices
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
Ontologies
sensors
Semantics
Semantic Web
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Passive optical networks
open systems
Ontology
ontologies (artificial intelligence)
composability
nonfunctional properties
Microelectronics Security
Metrics
JSON-LD
IoT security
IoT device security properties
IoT device privacy properties
IoT device interoperability
IoT device annotate connectivity properties
IoT device
interoperability
Internet of Things
data privacy
biblio
Internet of Things: Raging Devices and Standardization in Low-Powered Protocols
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
low-powered protocols
Thread
The Thing
standardization
standard communication protocols
sensors
security
Resiliency
resilience
raging devices
pubcrawl
Protocols
OSI model
OSI
open systems
6LoWPAN
IP networks
IoT system architecture
IoT devices
IoT
Internet of Things
internet
IEEE 802.15.4
IEEE 802.15 Standard
data centers
Cyber Physical Systems Security
computer centres
composability
CoAP
Capacity planning
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
biblio
An interoperable approach for Sensor Web provenance
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Sensor Web
provenance information
provenance model
pubcrawl
Resiliency
Semantic Web
Semantic Web technologies
sensor observation data
sensor observations
Provenance
Sensor Web domain vocabularies
Sensor Web provenance
usability
Vocabulary
W3C
W3C PROV
W3C PROV data model
complex information space
OWL
open systems
Ontologies
Metrics
linked data approach
Linked Data
interoperable approach
interoperability
internet
Human Factors
Human behavior
Data models
data analysis
Compositionality
composability
biblio
SuperMan: A Novel System for Storing and Retrieving Scientific-Simulation Provenance for Efficient Job Executions on Computing Clusters
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Metrics
SuperMan
storage management
SimUlation ProvEnance Recycling MANager
simulation
scientific-simulation provenance storage
scientific-simulation provenance retrieval
scientific information systems
scientific computing
Resiliency
Recycling
pubcrawl
Provenance
PROV
open systems
composability
job executions
interoperability
information retrieval
Human Factors
Human behavior
HPC
EDISON
digital simulation
Data models
Conferences
computing clusters
compute-intensive simulations
Computational modeling
Compositionality
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
Distributed Software Infrastructure for General Purpose Services in Smart Grid
Submitted by grigby1 on Mon, 11/13/2017 - 10:50am
open systems
web services
UK distribution network
smart power grids
Smart Grid
sensors
security
Resiliency
Reliability
pubcrawl
power system security
power engineering computing
power distribution reliability
pervasive computing
peer-to-peer distributed software infrastructure
Peer-to-peer computing
Aggregation
middleware security
middleware reliability
middleware
interoperability
heterogeneous technology
hardware-independent interoperability
general purpose services
event-driven middleware
event-based middleware
distribution network
distributed systems
Demand response (DR)
composability
communication technology attacks
collaboration
biblio
Building an Open Identity Platform for India
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
internet
vendor neutrality
unique identity project
technology platform
technology architecture
supply chains
security of data
security
pubcrawl170112
open systems
open standards
open source components
open identity platform
Aadhaar authentication service
India
design thinking
data centers
computer centres
computer architecture
Buildings
biometrics (access control)
biometric identity system
authentication
architecture
Aadhaar system
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
« first
‹ previous
1
2
3
4
5
next ›
last »