Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compliance
biblio
Curiosity Killed the Organization: A Psychological Comparison Between Malicious and Non-Malicious Insiders and the Insider Threat
Submitted by grigby1 on Thu, 05/18/2017 - 2:26pm
non-malicious insiders
unintentional acts
trait affect
risk management
Resiliency
pubcrawl
psychological factors
personality
organizational security
Compliance
malicious insiders
intentional acts
insider threat
Human Factors
Governance
expandability
cyber security
Compositionality
file
Bhatia_Automated_extraction_TB.pdf
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:14pm
CMU
Compliance
hypernym
Hyponym
natural language processing
Oct'16
Ontology
Privacy Policy
biblio
Automated Extraction of Regulated Information Types using Hyponymy Relations
Submitted by Jamie Presken on Wed, 12/07/2016 - 2:14pm
CMU
Compliance
hypernym
Hyponym
natural language processing
Oct'16
Ontology
Privacy Policy
CMU
Oct'16
biblio
Classifying Sanctions and Designing a Conceptual Sanctioning Process for Socio-Technical Systems
Submitted by mpsingh on Tue, 03/29/2016 - 7:57am
Apr'16
Compliance
Law
NCSU
Norms
Policy-Governed Secure Collaboration
sanctions
Sociology
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Policy-Governed Secure Collaboration
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Apr'16
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
« first
‹ previous
1
2
3