Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
authorization
biblio
Multi-Level Authentication Scheme for Improving Privacy and Security of Data in Decentralized Cloud Server
Submitted by grigby1 on Mon, 05/09/2022 - 4:36pm
Resistance
global identifier
Collusion Resistance
cloud server
Attribute authority
user privacy in the cloud
data authentication
Aerospace electronics
Scalability
Cloud Computing
Data Security
data privacy
authorization
authentication
Resiliency
resilience
pubcrawl
biblio
Design of an Authorized Digital Signature Scheme for Sensor Network Communication in Secure Internet of Things
Submitted by grigby1 on Tue, 04/26/2022 - 2:51pm
authorization
Authorized Digital Signature
Data Security
data transfer
digital signatures
Internet of Things (IoT)
manufacturing
process control
pubcrawl
resilience
Resiliency
Scalability
Sensor Network Communication
standardization
wireless sensor networks
biblio
Secure Data Deduplication And Sharing Method Based On UMLE And CP-ABE
Submitted by grigby1 on Tue, 04/19/2022 - 4:41pm
Analytical models
authorization
Ciphertext policy attribute-based encryption
Cloud Computing
computer science
Costs
CP-ABE
data access control
data sharing
policy-based governance
Protocols
pubcrawl
Scalability
secure deduplication
Unified modeling language
biblio
Verification of Cloud Security Policies
Submitted by grigby1 on Mon, 04/18/2022 - 10:53am
Access Control
authorization
Companies
metagraphs
policy-based governance
policy modeling
policy verification
process control
pubcrawl
Redundancy
rego
Scalability
security policies
Switches
tools
biblio
A Secure Multi Factor User Authentication Framework for Electronic Payment System
Submitted by grigby1 on Wed, 03/09/2022 - 1:40pm
Metrics
two
single factor
Electronic payments
Multi-factor authentication
multifactor authentication
Force
password
Reliability
security
authorization
security issues
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Accountable and privacy-aware flexible car sharing and rental services
Submitted by aekwall on Tue, 03/01/2022 - 4:31pm
Access Control
accountability
authentication
authorization
automobiles
composability
Metrics
network accountability
privacy
Protocols
pubcrawl
Resiliency
security
smart cities
Transportation
V2X
biblio
Formal Verification of Secure Forwarding Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:31pm
Network-Security
Veins
Security-Protocols
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
parametrized-verification
network topology
authentication
Isabelle/HOL
Formal-Verification
data-plane
computer architecture
Compositionality
composability
collaboration
autonomous systems
authorization
biblio
A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
information security
Transaction Security
tools
security
Scyther tool
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
Payment Protocol
Online banking
Mobile payment systems
Metrics
Industries
Cryptography
Compositionality
composability
collaboration
AVISPA tool
authorization
authentication
accountability
network accountability
Resiliency
biblio
An I/O Separation Model for Formal Verification of Kernel Implementations
Submitted by grigby1 on Thu, 02/24/2022 - 12:19pm
Trustworthy Computing
Security architectures
security
Scalability
pubcrawl
Privacy Policies
privacy
performance evaluation
I/O separation
Human behavior
Hardware
computer architecture
Computational modeling
authorization
access control and authorization
biblio
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Submitted by aekwall on Tue, 01/25/2022 - 3:52pm
Data Breach
Organizations
Data models
attribute-based encryption
authorization
encryption
pubcrawl
Scalability
Human behavior
policy-based governance
Cloud Computing
Personnel
attribute based encryption
electronic medical records
Ontologies
1
2
3
4
5
6
7
8
9
…
next ›
last »