Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud services
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
biblio
Prevention of DDoS attacks in cloud environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
endowment technological data
utility computing
touchy data
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
honeypot
Handheld computers
gigantic curiosity
Big Data
distributed denial of service
distributed computing
DDoS Defence procedures
DDoS Attack Prevention
DDoS Attack
computer network security
computational intelligence
computational assets
composability
collaboration
cloud services
cloud environment
Cloud Computing
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Kalman filter
virtualized cloud services
Virtual machining
virtual machines
Time series analysis
software fault tolerance
security of data
Scalability
Resiliency
pubcrawl
potential anomalies forecasting
Monitoring
Metrics
Live Migration of Virtual Machines
live migration
Kalman filters
Anomaly Detection
interconnected virtual machines
Intelligent systems
historical data
Detectors
cloud services migration
cloud services
Cloud Security
cloud disruption
Cloud Computing
Autonomic Security
Autonomic Cloud Security
autonomic cloud availability
AutoMigrate framework
AnomalyDetect approach
biblio
De-identifying facial images using projections on hyperspheres
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial image recognition
visualization
video sharing
social media
pubcrawl170113
privacy
Media
mass visual media distribution
malicious users
image classification
hyperspheres
automatic facial image identification
facial image deidentification
facial image classification
face recognition
Face
Error analysis
Databases
data privacy
common automatic identification algorithm
cloud services
« first
‹ previous
1
2
3
4
next ›
last »