Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating system
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Hypervisor-based cloud intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
multitenancy
virtualization technology
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine performance metrics
Virtual machine monitors
software metrics
Software Architecture
shared resource utilization
received packets
packet transmission
operating system
block device read requests
Measurement
intrusion detection security
Intrusion Detection
hypervisor-based cloud intrusion detection system
hypervisor performance metrics
hypervisor
CPU utilization
computer network security
Computer crime
cloud features
cloud computing resources
Cloud Computing
block device write requests
biblio
Protection in Operating Systems
Submitted by Heather Lucas on Wed, 11/26/2014 - 3:35pm
decidability
operating system
protection
protection system
Science of Security Significant Paper
Turing machine
« first
‹ previous
1
2
3
4
5