Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
network programmability
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
APC
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
Resiliency
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
computer network security
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
biblio
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
Pattern
smart phones
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
Scalability
Resiliency
resilience
pubcrawl
progressive authentication service
pattern matching
pattern locks
ALP
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
mobile computing
Human Factors
human factor
Human behavior
dependent combination
cluster based progressive smart lock
cluster
authorisation
authentication
Android (operating system)
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
When Willeke Can Get Rid of Paperwork: A Lean Infrastructure for Qualified Information Exchange Based on Trusted Identities
Submitted by grigby1 on Tue, 11/19/2019 - 3:38pm
authentication
authorisation
collaboration
data minimisation
data portability
digital infrastructures
distributed systems
EIDAS
GDPR
Governance
personal data management
Policy Based Governance
privacy
pubcrawl
qualified information exchange
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »