Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity privacy
biblio
Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
Gold
user collusion attacks
user authorization
user anonymity protection
user anonymity
security weaknesses
security enhancement
Resiliency
resilience
pubcrawl
policy-based governance
Outsourcing Decryption
Metrics
identity privacy
Human Factors
Human behavior
Access Control
finegrained access control
encryption
data privacy
data access privilege scheme
Cryptography
cryptanalysis
Computational modeling
collaboration
cloud data access privilege
Cloud Computing
authority collusion attacks
authorities collusion attack
authorisation
attribute-based encryption
biblio
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
lattice assumption
Wearable devices
sybil attacks
Resiliency
pubcrawl
patients health data
patient treatment
patient diagnosis
mobile healthcare networks analytics
mobile computing
MHN
Metrics
medical information systems
medical histories
ABS
identity privacy
health services
health care
fine-grained authentication scheme
Fiat-Shamir framework
disease treatment
disease diagnosis
digital signatures
data privacy
data analysis
composability
attribute-based signature
anonymous anti-sybil attack protocol
biblio
A trusted measurement scheme suitable for the clients in the trusted network
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
network security threat
trusted network connection
trusted network
trusted measurement scheme
trusted computing field
Trusted Computing
trust measurement scheme
static measurement
state measurement
real-time systems
real-time state measurement
real-time measurement support
real-time measurement
polynomials
access control technology
message authentication
identity privacy
Gold
fine-grained states
fine-grained security policy
fine granularity
dynamic measurement
data privacy
Complexity theory
authorisation
authentication mechanism
authentication
Area measurement