Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud services
biblio
Cloud Security Analysis Based on Virtualization Technology
Submitted by grigby1 on Fri, 09/01/2023 - 1:49pm
network security
Virtualized cloud security
Information Reuse
Costs
cloud services
Trusted Computing
cloud computing security
Compositionality
Dynamic scheduling
security
composability
Computers
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
Protected Distributed Data Storage Based on Residue Number System and Cloud Services
Submitted by grigby1 on Mon, 11/29/2021 - 1:11pm
Cloud Computing
cloud services
correcting codes
data storage system
Distributed databases
Internet of Things
Memory
pubcrawl
Redundant Residue Number System
Reliability
resilience
Resiliency
Secure storage
smart cities
System recovery
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
biblio
Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit
Submitted by aekwall on Mon, 02/01/2021 - 10:34am
Homomorphic encryption
multikey homomorphic encryption
multi-party computation
MK-TFHE library
arithmetic circuit
digital arithmetic
Logic gates
Boolean Circuit
arithmetic operations
Arithmetic Algorithm
Cloud Computing
Human Factors
cloud services
Metrics
pubcrawl
Resiliency
telecommunication security
Cryptography
Scalability
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 10:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Security Perceptions in Cloud-Based e-Govemment Services:
Submitted by grigby1 on Fri, 10/16/2020 - 10:13am
Human behavior
security perception
security of data
Resiliency
resilience
pubcrawl
policy-based governance
Perceived security
Jordan
IT-staff perspectives
interpretive-qualitative approach
citizen perspective
government stakeholders
government data processing
e-government initiative
E-Government
Cybersecurity
component
collaboration
cloud-based e-government services
cloud services
Cloud Computing
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 1:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
1
2
3
4
next ›
last »