Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
IoT services collaborations
telecommunication security
security policies
Routing
route events
Resiliency
publish/subscribe paradigm
Publish/Subscribe
pubcrawl
Niobium
multicast IoT service interactions
middleware
loose coupling
Logic gates
IoT services communication infrastructure
Access Control
IoT service communication infrastructure
IoT Service
Internet of Things
indirect IoT service interactions
Homomorphic encryption
event visibility
event producers
event consumers
encryption
cross-layer security solution
Cross Layer Security
composability
authorization
anonymous IoT service interactions
biblio
Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
Metrics
Web sites
Web servers
Web browsers
Web Browser Security
transport protocols
SSL-TLS certificates
security policies
security of data
security
Resiliency
pubcrawl
Protocols
Browsers
IoT
Internet of Things
internet
hypermedia
Human behavior
HTTPS protocol
HTTP strict transport security header
HTTP protocol
HSTS
Computer crime
communication security
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
Outsmarting Network Security with SDN Teleportation
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
network security
teleportation attacks
Teleportation
Switches
software-defined networking
software defined networking
Software
security policies
security
SDN teleportation
SDN
Scalability
Resiliency
pubcrawl
Backdoors
Malicious Switch
internet
intent-based networking
Heart
formally verifiable communication networks
design space
data plane
critical network functions
covert channels
control plane separation
computer network security
Compositionality
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Firewalls (computing)
Shadow mapping
security policy query engine
security policies
radically disjunctive approach
query processing
pubcrawl
policy-based governance
Policy
Government
Governance
FPQE
anomaly resolution
firewalls
firewall rules
firewall configuration
firewall anomalies
Explosions
Engines
Electronic mail
Correlation
correction process
collaboration
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »