Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Governance
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Natural languages
Usable Security
text analysis
South Africa
Software
Security policy compliance
security policies
security of data
pubcrawl
policy-based governance
Policy human aspects
Policy clarity
Policy ambiguity
Policy
collaboration
institutional information resources
InfoSec policy document
Information services
information security policy compliance
information security
Guidelines
Government
Governance
Educational institutions
educational institution
education
Content analysis
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration
biblio
Security policy transition framework for Software Defined networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
Software Defined Networks
software defined networking
Software
Security Policy Transitions
security policy transition framework
security policies
SDN environments
SDN
Ryuretic
RYU
pubcrawl
programming frameworks
Ports (Computers)
policy-based governance
Access Control
NOS
Network Security Policies
network operating system
network application development
Network Access Control
NAC
Monitoring
Kinetic theory
Government
Governance
external command
computer network security
collaboration
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
Cultural and Psychological Factors in Cyber-security
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
collaboration
culture
Cyber-security
Governance
Government
Human behavior
Human Factors
Metrics
personality traits
Policy
policy-based governance
privacy
pubcrawl
Resiliency
Security weakness
security weaknesses
biblio
Improving Vulnerability Detection Measurement: [Test Suites and Software Security Assurance]
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
pubcrawl
weakness
Vulnerability
test suites
static analysis
security weaknesses
Security weakness
Security Metrics
Resiliency
collaboration
policy-based governance
Policy
Metrics
Human behavior
Government
Governance
dynamic analysis
« first
‹ previous
1
2
3
4
5
next ›
last »