Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
Policy enforcement for big data security
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
Metrics
security of data
security
Scientific Computing Security
Resiliency
pubcrawl
Privacy Policy
privacy
policy enforcement
Policy
Big Data
large-scale data storage
data privacy
data analysis
Compositionality
Cloud Computing
Business
big data security
big data privacy
Big Data handling
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
biblio
Securing IoT devices using JavaScript based sandbox
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
JavaScript sandbox
security of data
security
sandboxing
pubcrawl
program execution
policy-based governance
Policy
networking
composability
JavaScript
Java
IoT devices
IoT device security
Internet of Things
Government
Governance
biblio
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
honeypots
underground market
UBA
Terminology
SIEM
security of data
security experts
security
sandboxing
pubcrawl
policy-based governance
Policy
Monitoring
Market research
life cycle phases
advanced persistent threat
highly skilled actors
Government
Governance
Electronic mail
delays
defence strategy
cyber-attacks
composability
compiled life cycle model
Biological system modeling
APT protection technologies
APT
advanced persistent threat attacks life cycle
biblio
PhishEye: Live Monitoring of Sandboxed Phishing Kits
Submitted by grigby1 on Mon, 11/20/2017 - 11:31am
composability
Governance
Government
Policy
policy-based governance
pubcrawl
sandboxing
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Firewalls (computing)
Shadow mapping
security policy query engine
security policies
radically disjunctive approach
query processing
pubcrawl
policy-based governance
Policy
Government
Governance
FPQE
anomaly resolution
firewalls
firewall rules
firewall configuration
firewall anomalies
Explosions
Engines
Electronic mail
Correlation
correction process
collaboration
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »