Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

multitenancy

biblio

Visible to the public An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure

Submitted by aekwall on Mon, 05/20/2019 - 10:03am
  • Kerberos
  • security protocols
  • resource management
  • resource allocation map
  • resource allocation manager unit
  • resource allocation
  • Resiliency
  • public key cryptography
  • pubcrawl
  • Protocols
  • multitenancy
  • multi-tenancy
  • multi-access systems
  • Metrics
  • message authentication
  • Kerberos authentication protocol
  • Cryptography
  • integrated model
  • Human behavior
  • encryption method
  • Elliptic curve cryptography
  • ECC
  • Databases
  • Cryptographic Protocols
  • control database
  • computer network security
  • Cloud Security
  • Cloud Computing
  • Cloud Authentication
  • cloud
  • authentication security
  • authentication
biblio

Visible to the public Hypervisor-based cloud intrusion detection system

Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
  • multitenancy
  • virtualization technology
  • Virtualization
  • virtualisation
  • Virtual machining
  • virtual machines
  • virtual machine performance metrics
  • Virtual machine monitors
  • software metrics
  • Software Architecture
  • shared resource utilization
  • received packets
  • packet transmission
  • operating system
  • block device read requests
  • Measurement
  • intrusion detection security
  • Intrusion Detection
  • hypervisor-based cloud intrusion detection system
  • hypervisor performance metrics
  • hypervisor
  • CPU utilization
  • computer network security
  • Computer crime
  • cloud features
  • cloud computing resources
  • Cloud Computing
  • block device write requests

Terms of Use  |  ©2023. CPS-VO