Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Replication management and cache-aware routing in information-centric networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
missing management
Transportation
traffic engineering approaches
telecommunication traffic
telecommunication network routing
Subscriptions
Servers
Routing
route management
replication management
Planning
performance management
network topology
native distribution network
cache management
internet
information-centrism
information-centric solutions
information-centric resources
information-centric networks
information-centric approaches
host-to-host Internet
end-to-end communication system
control plane
content distribution
computer architecture
clean-slate technologies
cache-aware routing
biblio
Towards adapting metamodelling technique for database forensics investigation domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
DBMS
software engineering domain
Servers
security
Organizations
model
metamodelling technique
Metamodelling
Metamodel
Forensics
Digital Forensics
Complexity theory
DBF metamodel
DBF complex knowledge processes
Database systems
database system integrity protection
database system confidentiality protection
database management systems
database forensics investigation domain
Database forensic investigation
Database forensic
data privacy
biblio
Smart City Security Issues: Depicting Information Security Issues in the Role of an Urban Environment
Submitted by BrandonB on Tue, 05/05/2015 - 9:26am
big cities
Cities and towns
Cloud Computing
data privacy
information security
Intelligent sensors
privacy issues
security issues
security of data
Servers
smart cities
Smart City
smart city security
urban environment
biblio
Social network security management model using Unified Communications as a Service
Submitted by BrandonB on Tue, 05/05/2015 - 9:25am
security of data
virtual machines
virtual machine
unified communications as a service
UCaaS approach
UCaaS
TRAIN model
Switches
Software as a service
social networks
social networking (online)
Social network services
social network security management model
Servers
access management processes
security management
security conditions
PC-FAST algorithm
multitenant services
multitenancy SaaS application
multi-tenancy
hosted services vulnerability
Communities
communication errors identification
communication errors detection
Cloud Computing
authentication
asynchronous asymmetric communications
biblio
Enabling efficient access control with dynamic policy updating for big data in the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
abe
Access Control
access policy
attribute-based encryption
authorisation
Big Data
cloud
Cloud Computing
Cryptography
dynamic policy updating
encryption
end-to-end security
outsourced policy updating method
Policy Updating
Public key
Servers
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
Automated and Agile Server ParameterTuning by Coordinated Learning and Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
Servers
neurocontrollers
Neurons
online learning
parameter tuning direction
predefined adjustment value
quantitative control output
reinforcement learning based server parameter tuning approach
self-adaptiveness
self-adjusting systems
Neural networks
system throughput
telecommunication computing
Throughput
Time factors
trial-and-error
virtualisation
virtualized data center hosting RUBiS
virtualized server infrastructure
WikiBench benchmark application
fault tolerant computing
agile server parameter tuning
automated server parameter tuning
average response time
bursty workloads
cloud environments
control engineering computing
coordinated learning and control
decision making process
effective throughput
agile parameter tuning
fuzzy control
internet
learning (artificial intelligence)
model independence
multitier applications
multitier Internet applications
multitier service architecture
neural fuzzy control
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 9:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
biblio
Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
Submitted by BrandonB on Tue, 05/05/2015 - 9:01am
password-protected keystore
Web protocols
Transport Layer Security
TOTP algorithm
TOAST scheme
TLS seed exchange
time-based OTP authentication
strong key derivation function
software-based token
Servers
security requirements
secure tunnel
Radiation detectors
PBEWithSHAANDTwofish-CBC function
authentication
one-time password
multifactor authentication cryptosystem
multifactor authentication
mobile TOTP scheme
Mobile communication
IETF RFC 6239 standard
Google
encrypted offline keystore
cryptosystems development
Cryptography
cryptographic standards
BC UBER keystore
authorisation
biblio
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Submitted by BrandonB on Tue, 05/05/2015 - 8:57am
interoperable operations
Servers
security features
seamless integration
Robustness
robust authentication scheme
Resource Observation
resource consuming secure algorithms
physical objects
Payloads
participating entities
authentication
Internet of things environment
Internet of Things (IoT)
Internet of Things
internet
digital world
Cryptography
Conditional Option
computationally complex algorithms
CoAP
authorisation
« first
‹ previous
…
84
85
86
87
88
89
90
91
92
…
next ›
last »