Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Access Control
biblio
Hybrid Access Control for Atoring Large Data with Security
Submitted by aekwall on Fri, 03/31/2023 - 9:39am
Cloud Computing
data privacy
encryption
Access Control
cloud storage
pubcrawl
Metrics
Resiliency
composability
Costs
Memory
Closed box
CP-ABE Techniques
EDoS attacks
Encrypted Cloud Storage
black box encryption
biblio
The Research on Material Properties Database System Based on Network Sharing
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Java
Network sharing
material properties
J2EE
intelligent service
data security control
database
relational database security
Database systems
security management
Data visualization
pubcrawl
composability
data acquisition
Access Control
Data models
Software
Resiliency
resilience
Metrics
Human behavior
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
Property Graph Access Control Using View-Based and Query-Rewriting Approaches
Submitted by grigby1 on Fri, 03/17/2023 - 12:14pm
Big Data
query rewriting
graph database
Ac-cess Control
relational database security
Database systems
Time factors
social networking (online)
composability
relational databases
process control
Access Control
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Critical Data Security Model: Gap Security Identification and Risk Analysis In Financial Sector
Submitted by grigby1 on Fri, 03/17/2023 - 12:13pm
Big Data
Data Breach
Bank
relational database security
PII
Market research
Access Control
Data Security
composability
relational databases
Data models
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Organizations
biblio
A Secure mechanism to protect UAV communications
Submitted by grigby1 on Fri, 03/03/2023 - 5:17pm
control systems
kerberos security
UAV Communication Network
Kerberos
Internet security
Internet of drones
uav
distributed systems
Intelligent systems
Access Control
smart cities
Internet of Things
Cryptography
authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
biblio
A Blockchain and ABAC Based Data Access Control Scheme in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 5:06pm
blockchain
information sharing
blockchains
File systems
smart contract
data sharing
smart grid security
Metrics
smart contracts
information security
ABAC
process control
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 5:03pm
encryption
pubcrawl
Metrics
Resiliency
data privacy
Access Control
Smart Grid
Smart Grids
Scalability
attribute-based encryption
outsourcing
Costs
data access control
computation outsourcing
Smart Grid Privacy
biblio
Research on Data Security and Privacy Protection of Smart Grid Based on Alliance Chain
Submitted by grigby1 on Fri, 01/20/2023 - 4:59pm
security
pubcrawl
Metrics
Resiliency
Safety
data privacy
Access Control
process control
smart meters
Smart Grids
Blockchain technology.
Paillier homomorphic encryption algorithm.
Role-Based access control policy.
Smart grid.
Smart Grid Privacy
biblio
Auditing a Software-Defined Cross Domain Solution Architecture
Submitted by grigby1 on Fri, 01/06/2023 - 4:05pm
Access Control
trusted systems
Cross Domain Solution
Configuration Security
Architecture Description Language
trustworthiness
Security analysis
Data protection
Trusted Computing
Mission critical systems
Air gaps
computer architecture
composability
Computational modeling
Data models
Hardware
Software
Resiliency
resilience
Metrics
Human behavior
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »