Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security requirements
biblio
Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
CMU
Jan'17
biblio
Nane: Identifying Misuse Cases Using Temporal Norm Enactments
Submitted by ozgurkafali on Fri, 06/17/2016 - 8:27am
Digital Forensics
security requirements
temporal reasoning
biblio
LUT based secure cloud computing #x2014; An implementation using FPGAs
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
Games
Table lookup
suitable hardware platform
security requirements
security of data
secure cloud computing scheme
program security
pattern clustering
LUT based secure cloud computing
look-up table
k-means clustering algorithm
Big Data
FPGA
Formalization
field programmable gate arrays
encryption
data sharing
data security problem
cryptographic techniques
Cloud Computing
big data processing
biblio
Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
Submitted by BrandonB on Tue, 05/05/2015 - 9:01am
password-protected keystore
Web protocols
Transport Layer Security
TOTP algorithm
TOAST scheme
TLS seed exchange
time-based OTP authentication
strong key derivation function
software-based token
Servers
security requirements
secure tunnel
Radiation detectors
PBEWithSHAANDTwofish-CBC function
authentication
one-time password
multifactor authentication cryptosystem
multifactor authentication
mobile TOTP scheme
Mobile communication
IETF RFC 6239 standard
Google
encrypted offline keystore
cryptosystems development
Cryptography
cryptographic standards
BC UBER keystore
authorisation
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU
« first
‹ previous
1
2
3
4
5