Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
web services
biblio
Towards an Attack Signature Generation Framework for Intrusion Detection Systems
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
security of data
XPath injection
XML
web services
Web Service
web security testing tools
Weapons
tools
SOAP injeciton
Simple object access protocol
signature IDSs
Signaturebased Intrusion Detection Systems
signature based defense
Servers
attacks
Scalability
Resiliency
resilience
pubcrawl
privilege escalation
organizations valuable information resources
Information Leakage
genetic algorithms
deployed web services
attack signatures
attack signature generation framework
attack signature generation approach
biblio
A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies
Submitted by grigby1 on Thu, 05/24/2018 - 12:28pm
model-checking approach
web services
user behavior monitoring
realistic policies
purpose-based privacy policies
pubcrawl
private information
privacy models
privacy management tool
privacy management system
privacy
Natural languages
complex privacy policies
model checking
Metrics
Measurement
information disclosures
formal verification
formal modeling
Electronic mail
data sharing actions
data privacy
Data models
customized privacy policies
biblio
Trust-Aware and Location-Based Collaborative Filtering for Web Service QoS Prediction
Submitted by grigby1 on Mon, 03/26/2018 - 12:55pm
QoS
web services
Web Service
web of trust
Trusted Computing
trust-aware collaborative filtering
trust-aware
Resiliency
resilience
recommender systems
quality of service
QoS prediction
Cloud Computing
pubcrawl
Prediction algorithms
Mathematical model
location-based collaborative filtering
location
internet
geographical location
composability
collaborative filtering
collaboration
biblio
Towards an Efficient File Synchronization between Digital Safes
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Protocols
WebSocket protocol
WebSocket
web services
trees (mathematics)
synchronization protocol efficiency
Synchronization
SyncDS protocol
storage management
Servers
security
Secure File Sharing
Resiliency
resilience
pubcrawl
Cloud Computing
Networking Protocol
Metrics
metadata
Human behavior
HTML5 Local Storage API
hierarchical hash tree
file synchronization
Digital Safe
Cryptographic Protocols
Context
composability
cloud storage solutions
cloud service
biblio
Exogenous Connectors for Hierarchical Service Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
orchestration
web services
visualization
total compositionality
Software Architecture
service-oriented systems
service-oriented architecture
Sequential analysis
Scalability
pubcrawl
Proposals
choreography
MusicCorp
microservices
message passing
hierarchical service composition
explicit control flow
exogenous connectors
Distributed databases
Connectors
Compositionality
biblio
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Mobile Cloud middleware
web services
Web service governance
security of data
security criteria regulation middleware
security criteria regulation
security
pubcrawl
policy-based governance
Policy Based Governance
Policy
PGP
PDP
Organizations
multicloud tenancies
asset consumer security profiles
middleware
ESB-integrated middleware
cumbersome policy files
computing power
computing functionality
computer architecture
component
complex composite service
colosum scaling property
collaboration
Cloud Computing
attribute-based security policy model
attribute-based security policy
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »