Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Submitted by BrandonB on Tue, 05/05/2015 - 7:57am
authentication
authorisation
CoAP
computationally complex algorithms
Conditional Option
Cryptography
digital world
internet
Internet of Things
Internet of Things (IoT)
Internet of things environment
interoperable operations
participating entities
Payloads
physical objects
resource consuming secure algorithms
Resource Observation
robust authentication scheme
Robustness
seamless integration
security features
Servers
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 7:44am
API
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
Information services
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
schema validation
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
SOAPAction spoofing
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
biblio
Concerns regarding service authorization by IP address using eduroam
Submitted by BrandonB on Tue, 05/05/2015 - 7:41am
authentication credentials
authorisation
authorization
eduroam
firewall
firewalls
home credentials
home institution
home networks
IEEE Xplore
internet
IP address
IP networks
IP-Based
legal agreements
proxy servers
secure Internet access
secure WLAN roaming service
Servers
service authorization
Service Level Agreement
visited institution
wireless LAN
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 1:56pm
Cryptography
data exchange
data privacy
electronic data interchange
HTTPI protocol
intelligent agent
intelligent agent based privacy preserving model
internet
Internet Protocol Security
IP Sec
multi-agent systems
OSI layers
privacy preserving
Protocols
QoS requirements
quality of service
quality of services
secure channel
secured socket layer
security of data
Simple object access protocol
SOAP
SSL
TLS
Transport Layer Security
UDDI
Web service security
web services
WSDL
XML
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:55pm
802.1X
access control functionality
authentication
authorisation
authorization
computer network security
Cryptographic Protocols
EAP
extensible authentication protocol
IEEE 802.15 Standards
IEEE 802.15.4
IEEE 802.15.4 networks
internet
Internet of Things
IoT networks
Local area networks
Payloads
Protocols
security
Servers
wireless LAN
Zigbee
biblio
The design of the secure transmission and authorization management system based on RBAC
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
Abstracts
Aspect-oriented programming
authorisation
authorization
authorization management system
centralized authority
certificate authority system
client-side digital certificate
data secure transmission
Digital certificate
distributed authority management
E-Government
Electronic government
group authority
identity authentication
internet
MVC model
PKI
PKI principles
public key cryptography
public key infrastructure
RBAC model
RBACt
Rose-based access control
server-side digital certificate
SSL protocol
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 1:53pm
Access Control
access rights
authentication
authorisation
Cloud Computing
cloud service
Computers
data correctness
Databases
directory services
Educational institutions
internet
mutual authentication
security as a service
Servers
token granting
token management system
user authorization
virtual shared servers
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:52pm
authentication
authorisation
authorization
Cloud Computing
Computational modeling
digital signature authorization
digital signatures
GD2SA
geo detection
Geo-Detection
internet
Reliability
Second Verification
secure access
security
user authentication
virtualisation
Virtualization
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by BrandonB on Mon, 05/04/2015 - 1:50pm
authentication
authorisation
authorization and accounting
Availability
Browsers
cloud based applications
cloud based services
Cloud Computing
Cloud Security
cloud service providers
cloud system architecture
Computational modeling
diameter AAA mechanisms
Diameter-AAA
internet
Protocols
security management
Servers
Web based applications
biblio
Cyber Scanning: A Comprehensive Survey
Submitted by BrandonB on Mon, 05/04/2015 - 1:40pm
Protocols
targeted cyber attack
Servers
security of data
Scanning events
Probing campaigns
Probing
Probes
Ports (Computers)
Network reconnaissance
Monitoring
Internet wide services
internet
enterprise networks
distributed cyber scanning detection method
Cyberspace
cyber scanning technique
Cyber scanning
« first
‹ previous
…
67
68
69
70
71
72
73
74
75
next ›
last »