Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
multiauthority CP-ABE scheme
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
Ciphertext policy attribute-based encryption
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
Cryptography
bilinear maps
fine-grained access control
Resists
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption scheme
CP-ABE
Lattices
policy-based governance
pubcrawl
Cloud Computing
Scalability
data privacy
authorisation
Access Control
encryption
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
attribute certificate
collaboration
updating distributing keys
role-based access control
RBAC
Performance
key update
existing CP-ABE based schemes
efficient key update function
efficient data Access Control
data outsourcing environment
CP-ABE policy
Ciphertext Policy - Attribute-based Encryption
Attribute certificate management
Cryptography
access request
access control model
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Access Control
CP-ABE
policy-based governance
pubcrawl
Conferences
Scalability
outsourcing
Cloud Computing
authorisation
biblio
New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy-ba
Cipher Text-Policy Attribute Based Encryption
collaboration
privacy-preserving policy
New Hidden Policy CP-ABE schemes
New Hidden Policy Ciphertext Policy Attribute
Multi Secret Sharing Scheme
HP-CP-ABE
data leakage problem
big data processing
Big Data Access Control
access policy privacy
Cryptography
CP-ABE
policy-based governance
pubcrawl
privacy
Big Data
Scalability
data privacy
Cloud Computing
authorisation
Access Control
encryption
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
attribute base encryption
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy hiding
outsourced environment
mobile terminals
mobile end
lightweight decryption
data outsourcing (key words)
CP-ABE scheme
component
attributes revocation
attribute revocation
Ciphers
algorithm analysis
CP-ABE
policy-based governance
pubcrawl
outsourcing
Scalability
Servers
authorisation
Access Control
encryption
Cryptography
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
data user
user attribute
Servers
searchable CP-ABE scheme
searchable attribute-based encryption schemes
Scalability
revocation stage
Public key
pubcrawl
provable security
policy-based governance
multi-keyword search
encryption
attribute revocation
data privacy
Cryptography
CP-ABE
collaboration
cloud service provider
cloud computing environment
Cloud Computing
ciphertext information
authorization server
authorization information
authorization
authorisation
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »