Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
Attribute-Based Accountable Access Control for Multimedia Content with In-Network Caching
Submitted by aekwall on Mon, 08/17/2020 - 10:43am
telecommunication control
service requirement
service accounting
secure access control
Multimedia content security
multimedia content retrieval
multimedia content provider
multimedia content distribution
IP traffic
informal security analysis
in-network content caching
in-network caching
edge router side
attribute-based accountable access control scheme
access policy based authentication
IP networks
Multimedia communication
Streaming media
authentication
telecommunication network routing
policy-based governance
pubcrawl
Human behavior
telecommunication security
attribute-based encryption
encryption
Cryptography
Access Control
telecommunication traffic
Scalability
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
pubcrawl
user access control
typical IoT system model
middleware layer
IoT system architecture
IoT gateway
device data
attribute based access control
IoT middleware
data handling
internetworking
middleware
Logic gates
authentication
policy-based governance
security
Human behavior
data encryption
IoT devices
Internet of Things
attribute-based encryption
Cryptography
authorization
authorisation
Access Control
ciphertext-policy attribute-based encryption
Scalability
computer network security
IoT
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
Attribute-Based Access Control in Service Mesh
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
authentication
software infrastructure layer
service mesh mechanisms
Service Mesh
modern cloud applications
interservice interaction
highly dynamic environment
Attribute-based encryption methods
service discovery
Temperature sensors
fine-grained access control
Buildings
Cloud Computing
policy-based governance
pubcrawl
Human behavior
Protocols
attribute-based encryption
encryption
Cryptography
authorisation
Access Control
Scalability
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
biblio
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
privacy-preserving warning message dissemination
Human Factors
internet
Internet of Things
Internet of Vehicles
lightweight vehicles
message authentication
message integrity
Metrics
Human behavior
pubcrawl
resilience
Resiliency
Scalability
secure privacy-preserving dissemination scheme
vehicular ad hoc networks
verifiable encryption
Access Control
driver privacy issues
data dissemination
cyber physical systems
Cryptography
conditional privacy preservation mechanism
conditional privacy preservation
computer network security
cloud-assisted IoV
cloud-assisted Internet
Cloud Computing
attribute-based message encryption schemes
attribute-based encryption
anonymous vehicle authentication
anonymous messaging
anonymous identity-based signature technique
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »