Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
The Security Policies Optimization Problem for Composite Information Systems
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Information systems
Task Analysis
security policy
security policies
security
policy-based governance
optimization
operating systems
mandatory access control
pubcrawl
information security
discretionary access control
Access Control
Metrics
composability
resilience
Resiliency
Operating systems security
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Dynamic Information Flow Tracking for Embedded Binaries using SystemC-based Virtual Prototypes
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
Metrics
virtual prototyping
vehicle dynamics
SystemC-based virtual prototypes
security vulnerabilities
security related exploits
security policies
security of data
security
Resiliency
resilience
pubcrawl
Prototypes
accurate DIFT
existing DIFT approaches
Engines
embedded systems
embedded binaries
early DIFT
Dynamic Information Flow Tracking
DIFT engine
Data models
data flow analysis
composability
C++ languages
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Runtime Verification of Hyperproperties for Deterministic Programs
Submitted by grigby1 on Mon, 11/02/2020 - 11:39am
pubcrawl
system monitoring
software doping
Software
security policies
security of data
security
Scalability
safety hyperproperty
Safety
runtime verification problem
runtime verification monitors
runtime verification
Runtime
data minimality
program verification
parametric monitor
noninterference
Monitoring
information-flow policies
information-flow
i/o systems security
i-o systems security
finite element analysis
Doping
deterministic input-output programs
deterministic algorithms
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Design of Electronic Medical Record Security Policy in Hospital Management Information System (SIMRS) in XYZ Hospital
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
hospitals
Triangle Policy Analysis
SIMRS
Security Control
records management
privacy control mapping
medical record management system
hospital management information system
EMR management
EMR
electronic medical record security policy
security of data
medical computing
health care
security policies
NIST
risk management
policy-based governance
pubcrawl
electronic health records
data privacy
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »