Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
service providers
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
A smart middleware to detect on-off trust attacks in the Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
security of data
on-off trust attacks
performance evaluation
Pervasive Computing Security
policy-based governance
pubcrawl
real-time systems
Resiliency
security
On-Off Attacks
sensors
service providers
service requesters
smart middleware
sophisticated trust threat
trust
Trusted Computing
complex environment
node behavior
middleware security
middleware
Metrics
malicious device
low trust node
IoT Security 2018
IoT resources trust
Internet of Things designs
Internet of Things
internet
Human behavior
heterogeneous environment
Data models
composability
biblio
Improving response accuracy for classification- based conversational IT services
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
process-based methodology
Automated Response Actions
user-question classifiers
training set scenarios
subject matter experts
software support
service support scenario
service resolution quality
service providers
service domain knowledge
Cloud Computing
IT services
conversation quality
cloud-based solutions
customer satisfaction
pattern classification
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Two-Phase Incentive-Based Secure Key System for Data Management in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Scalability
Internet of Things
key complexity
key cost
light-weight keys
low-level secure keys
multiphase security
network optimization
privacy
Privacy Policies
pubcrawl
Human Factors
security keys
self-trust incentive level
server-trust incentive level
Servers
service providers
TISK phase-I Generic Service Manager
TISK phase-II Dedicated Service Manager
TISK system
two-phase incentive-based secure key system
user nodes
data manager nodes
authentication
authorisation
authorized transactions
Certificate Generation
Complexity theory
computer network security
data aggregator nodes
data collector nodes
data expert nodes
data integrity
Aggregation
data privacy
data transactions
Database management in IoT
distributed data management
Distributed databases
distributed secure data management system
DSM-C module verifies
expert systems
GSM-C module
high-level secure keys
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity
« first
‹ previous
1
2