Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
Ontological Framework for Ensuring Correctness of Security Policies in Cloud Environments
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security policies
pubcrawl
Cloud Computing
Governance
Ontologies
OWL 2
Policies
privacy
security
biblio
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security policies
pubcrawl
conceptual framework
Dimensions
Information Security Culture
Information Security Policy Compliance Behavior
Organizational Culture
biblio
Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
Compliance
information systems security
information systems security policy
insider threat
noncompliance
pubcrawl
review
security policies
biblio
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security breaches
US Health Insurance Portability and Accountability Act
US Department of Health and Human Services
taxonomy
software engineering
software development
social norms
SEMAVER
Semantics
semantic similarity metric
semantic similarity
semantic reasoning
security policies
security of data
accidental misuses
Security and privacy breaches
security
pubcrawl
Ontologies
norm violation
Medical services
Measurement
malicious misuses
inference mechanisms
HIPAA
HHS
cognition
breach ontology
biblio
A generic framework for information security policy development
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
Law
security policy development
security policy content
security policies
security of data
risk management
replicated policy
pubcrawl
Organizations
maintenance engineering
education
information security policy development process
information security policy
information security policies
information security
improper development process
higher education institutions
generic framework
further education
biblio
Research on modeling for network security policy confliction based on network topology
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
network topology
telecommunication security
telecommunication network topology
security policy model
security policies
security
Routing
pubcrawl
Protocols
Policy consistency
Peer-to-peer computing
campus network
network security policy confliction
network security field
network modeling
network devices
IP networks
graph theory
distributed network system
Conflict checking
Communication networks
biblio
Secure Policy-based Device-to-device Offloading for Mobile Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:27pm
Policy Based Governance
collaboration
Data Security
Governance
hybrid mobile cloud computing
mobile application offloading
mobile cloud computing
mobile device attestation
Policy
policy-based governance
pubcrawl
security policies
XACML
biblio
Policy-Customized: A New Abstraction for Building Security as a Service
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Resiliency
Virtual machining
Virtual machine monitors
Trusted Cloud Service
Servers
security policies
Security on Demand
security
Scalability
Cloud Computing
Remote Attestation
pubcrawl
Protocols
Policy-Customized
Pervasive Computing Security
Metrics
Human Factors
computer architecture
biblio
SDN testbed for validation of cross-layer data-centric security policies
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
operational military systems
Software-Defined Networks
software-defined networking
software defined networking
Software
Servers
security policies
security
SDN security mechanisms
Resiliency
pubcrawl
principal component analysis
Ports (Computers)
Access Control
OpenFlow-based testbed
military computing
information security
Data Security
cross-layer data-centric security policies
Cross Layer Security
control systems
Containers
computer network security
computer centres
composability
Communication system security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »