Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
certification
biblio
Security Certification Scheme for Content-centric Networks
Submitted by aekwall on Fri, 02/04/2022 - 10:33am
Resiliency
Repudiation
service computing
named data networking
Content-Centric Networking
certification
information-centric networking
composability
Human behavior
security
Metrics
pubcrawl
Conferences
Analytical models
Protocols
quality of service
privacy
biblio
A distortion-free watermarking approach for verifying integrity of relational databases
Submitted by grigby1 on Tue, 08/31/2021 - 11:03am
Metrics
Watermarking
tamper detection
Resiliency
resilience
relational databases
relational database security
Relational Database
Registers
pubcrawl
certification
integrity protection
Human behavior
Distortion-free
distortion
Databases
database watermarking
Conferences
composability
biblio
Developing a Secured and Reliable Vehicular Communication System and Its Performance Evaluation
Submitted by aekwall on Mon, 08/02/2021 - 3:08pm
vehicular ad hoc networks
manet privacy
Vehicular Ad Hoc Network (VANETs)
Traffic Certification Authority (TCA)
secure and reliable
Roadside Infrastructure Unit (RSU)
network security
certification
Access Control List(ACL)
IP networks
Safety
Compositionality
Resiliency
Metrics
pubcrawl
Servers
Monitoring
sensors
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security
Submitted by grigby1 on Tue, 03/16/2021 - 2:09pm
IT industry
security of data
Security certification
security
RNA
Resiliency
resilience
pubcrawl
privacy
policy-based approach
Policy
organisational aspects
Metrics
Licenses
IT security incidents
IT security
certification
ISO standards
integrated circuits
Human behavior
Governance
GDPR
Europe
Equifax
DP management
DP industry
corporate social responsibility
Conferences
collaboration
clean-slate governance approach
clean slate
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
digital certificates
human trust
ACME
ACME protocol
Automated Certificate Management Environment
automation issue
certificate issuance automation protocol
conventional security models
current trust issues
blockchain technology
digital trust
Ethereum blockchain
PKI model
Public Key Infrastructure model
trust concerns
trust enhancement
trusted Certificate Authority
Servers
human interaction
public key infrastructure
certification
certificate authority
contracts
public key cryptography
Public key
ethereum
trust
blockchain
pubcrawl
Human behavior
Protocols
Internet of Things
authorisation
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
A Pseudonym Certificate Management Scheme Based on Blockchain for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:49am
public key cryptography
pseudonym certificate management scheme
Pseudonym certificate
lifecycle
distributed maintenance
cybercrime attacks
network resources
cyber physical systems
Internet of Vehicles
certification
certificate revocation list
Human Factors
network structure
automobiles
standards
blockchain
Metrics
Cryptography
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
security of data
Safety
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
1
2
3
4
5
next ›
last »