Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
A multi-modelling based approach to assessing the security of smart buildings
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
methodology
ubiquitous computing
system components
smart buildings
simulations
security of data
Resiliency
resilience
pubcrawl
physical attacks
multimodelling based approach
multimodel methodology
Metrics
Access Control
man-in-the-middle attacks
INTO-CPS tool chain
home automation
Fans
fan coil unit
cyber-physical systems
critical services
CPS modeling
composability
co-simulation
building management systems
adversary model
biblio
Framework for Trustworthy Software Development
Submitted by aekwall on Mon, 04/13/2020 - 10:20am
auditability
Trustworthy Systems
trustworthy software development
trustworthy software
transparency
total product life cycle
smart advisors
process level
intelligent software applications
governance framework
Governance
bias-free
security of data
application development life cycle
algorithmic level
cyber physical systems
ubiquitous computing
trustworthiness
software engineering
Provenance
Compliance
composability
pubcrawl
Resiliency
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 10:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »