Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security aspects
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
privacy leakage
Service robots
security aspects
security
ROS
robots
robotic systems
robotic applications
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Policy-based access control
permissions
operating systems
modern robots
Human Factors
Human behavior
extended policy-based access control model
data privacy
basic permission control mechanism
authorisation
Adaptation models
access control mechanism
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
distributive nature
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
security issues
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
privacy
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
security of data
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
biblio
Security Aspects of Cyber Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
Human Factors
CPS Privacy
Manufacturing industries
Home appliances
design models
CPS Security Aspects
control system models
control security
communication models
Cyber Physical System
Sensor Systems
security aspects
CPS
security of data
Intelligent sensors
security threats
control systems
Smart Grids
cyber physical systems
privacy
pubcrawl
Human behavior
cyber-physical systems
information security
security
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
A Middleware Framework to Address Security Issues in Integrated Multisystem Applications
Submitted by aekwall on Mon, 01/13/2020 - 11:18am
open systems
Systems-of-Systems
Systems Integration
smart cities
sensors
security of data
security attacks
security aspects
security
Resiliency
pubcrawl
production engineering computing
Access Control
multisystem integration
middleware
Metrics
manufacturing systems
interoperability
integrated multisystem applications
industrial applications
Human behavior
composability
actuators
actuator security
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU