Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud services
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
"Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds"
Submitted by grigby1 on Tue, 02/14/2017 - 12:30pm
GPU Shader
video filter
social networks
social networking (online)
pubcrawl170102
private sharing
privacy
multi-channel chained solutions
media data hiding
Media Data
Media
Markov cipher
image filter
Image coding
Big Data
format-compliant end-to-end privacy-preserving scheme
Format-Compliant
encryption
data privacy
data encapsulation
Cryptography
cloud services
cloud networks
Cloud Computing
cloud
Chaotic Mapping
big media data storage
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
Efficient search on encrypted data using bloom filter
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
data theft
storage cost reduction
Servers
sentence search
search operations
information retrieval
Information filters
Indexes
filtering algorithms
Encrypted Search
efficient encrypted data search
document handling
document decryption
approximate search
data structures
data misuse
data loss
Cryptography
cryptographic techniques
cost reduction
computer science
cloud services
Cloud Computing
case sensitive search
Bloom filter
Approximate Search and Bloom Filter
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
biblio
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
distributed denial-of-service attacks
thermal properties
Temperature distribution
Servers
server downtime prevention
power aware computing
network simulation
network management protocols
Monitoring
HVAC systems
HVAC
heating-ventilation-and-air-conditioning systems
Heating
Cloud Computing
defense strategies
DDoS Attack
Data models
data center meltdown
Data center communications
Cooling
computer network security
computer network management
Computer crime
computer centres
cloud services
« first
‹ previous
1
2
3
4