Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access Control
biblio
Attribute-based proxy re-encryption method for revocation in cloud storage: Reduction of communication cost at re-encryption
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
revoked users
easy storage
huge communication costs
hybrid encryption scheme
matching attributes
privacy concerns
Proxy re-encryption
proxy re-encryption method
revocation
data privacy
Syalim encryption scheme
symmetric encryption scheme
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
AES key
Scalability
Servers
Access Control
Cryptography
Data Security
encryption
abe
advanced encryption standard
Cloud Computing
attribute-based encryption
Attribute-Based Encryption (ABE)
Big Data
cloud storage
communication cost
Computational efficiency
data owner
biblio
HGAA: An Architecture to Support Hierarchical Group and Attribute-Based Access Control
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
Scalability
ABAC
Access Control
architecture
Attribute authority
attribute certificate
attribute-based access control
HGAA
HGABAC
hierarchical group and attribute-based access control
hierarchical group attribute architecture
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 4:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
Precise Android API Protection Mapping Derivation and Reasoning
Submitted by grigby1 on Fri, 02/08/2019 - 4:11pm
Access Control
android
APIs
Compositionality
permission model
pubcrawl
resilience
Resiliency
biblio
An Efficient Oblivious Transfer Protocol with Access Control
Submitted by grigby1 on Thu, 01/31/2019 - 12:22pm
illegal user access
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
privacy-preserving database
privacy
OTAC
Oblivious transfer
Access Control
Elliptic curve cryptography
efficient oblivious transfer protocol
data privacy
Cryptographic Protocols
authorisation
Asia
anonymous messaging
anonymous access
access control policy
biblio
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
Scalability
Internet of Things
message authentication
mobile radio
privacy
pubcrawl
Public key
resilience
Resiliency
identity-based broadcast signcryption
telecommunication control
ubiquitous computing
ubiquitous healthcare system
WBAN
Wireless body area networks
Wireless communication
Wireless communications
context-aware access control
adaptive access control scheme
adaptive contextual privacy
anonymous authentication approach
anonymous messaging
authentication
authorisation
body area networks
ciphertext authenticity
Access Control
context-aware authorization
context-aware privacy
Cryptography
data privacy
health care
healthcare services
hybrid certificateless signcryption
biblio
On the need for coordinated access control for vehicular visible light communication
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
huge unlicensed spectrum
Visible Light Communications Security
Vehicular VLC
vehicular visible light communication
vehicular communications
V-VLC
Roads
Packet loss
negligible interference
Luxembourg mobility model
LOS requirement
interference-induced packet loss
IEEE 802.15 Standard
pubcrawl
high throughput applications
dedicated medium access control
coordinated access control
collision domain
access protocols
Access Control
Receivers
optical communication
Interference
Scalability
Resiliency
Metrics
biblio
Challenges and Preparedness of SDN-based Firewalls
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
network manageability
Vulnerability Management
virtualization privacy
surveys and overviews
software defined networking
security and privacy
sdn based firewall
Resiliency
pubcrawl
privacy
OpenFlow protocol
OpenFlow
network security
Access Control
Metrics
Human behavior
header space analysis
flow control
firewalls
data plane
data centers
data center networks
control plane
Conflict Resolution
conflict detection
composability
biblio
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
IoT architecture
virtualization privacy
Virtual Objects
security
Resiliency
RBAC
pubcrawl
privacy
Metrics
ABAC
Internet of Things (IoT)
Human behavior
Devices
composability
aws iot
ACL
Access Control
biblio
Formulation of SQL Injection Vulnerability Detection as Grammar Reachability Problem
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Access Control
Compositionality
cross-site scripting
flow graphs
Grammar
Human behavior
Metrics
Production
pubcrawl
reachability analysis
Resiliency
SQL injection
static analysis
vulnerabilities detection
vulnerability detection
Web application
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »