Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourcing
biblio
OUTFS+. An Efficient User-Side Encrypted File System Using IBE With Parallel Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 11:47am
operating systems
Parallel Encryption
file system
efficient encryption
outsourcing
cloud storage
identity based encryption
File systems
Market research
information retrieval
Cloud Computing
Libraries
composability
Cryptography
Software
Resiliency
resilience
pubcrawl
security
biblio
An Enhanced Copy-deterrence scheme for Secure Image Outsourcing in Cloud
Submitted by grigby1 on Fri, 06/30/2023 - 1:33pm
Image coding
Secure content-based image retrieval
JPEG compression attack
Encrypted images
Copy-deterrence
Deterrence
outsourcing
biometrics (access control)
Transform coding
pubcrawl
Watermarking
Forensics
Cryptography
Scalability
Resiliency
resilience
Human behavior
biblio
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience
Submitted by grigby1 on Fri, 05/19/2023 - 1:07pm
encryption
Internet of Things
Cloud Computing
pubcrawl
policy-based governance
collaboration
Scalability
privacy
Technological innovation
CP-ABE
outsourcing
Smart healthcare
Ciphertext policy attribute-based encryption (CP-ABE)
hidden policy
leakage resilience
Smart health records (SHRs)
biblio
A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM
Submitted by grigby1 on Fri, 05/19/2023 - 1:06pm
Data Security
verifiable
cloud-chain fusion
auditable
blockchains
SWIM
Multi-authority
outsourcing
CP-ABE
pubcrawl
Decision Making
Industries
Access Control
Scalability
performance evaluation
collaboration
policy-based governance
biblio
Energy-Efficient Black Hole Router Detection in Network-on-Chip
Submitted by aekwall on Fri, 02/17/2023 - 9:44am
Energy Efficiency
Multiprocessor interconnection
Integrated circuit interconnections
HT
Energy-Efficient
black hole
BHR
outsourcing
Router Systems Security
hardware trojan
Runtime
NoC
network-on-chip
Predictive Metrics
Throughput
Resiliency
pubcrawl
biblio
A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 4:03pm
encryption
pubcrawl
Metrics
Resiliency
data privacy
Access Control
Smart Grid
Smart Grids
Scalability
attribute-based encryption
outsourcing
Costs
data access control
computation outsourcing
Smart Grid Privacy
biblio
Secure Outsourcing of Fuzzy Linear Regression in Cloud Computing
Submitted by grigby1 on Fri, 08/26/2022 - 10:09am
tools
Cloud Computing
machine learning
security
pubcrawl
Protocols
Metrics
Linear programming
Computing Theory
outsourcing
linear regression
fuzzy linear regression
Secure computing
transformational approach
biblio
Twine: An Embedded Trusted Runtime for WebAssembly
Submitted by grigby1 on Fri, 07/29/2022 - 3:48pm
Runtime
outsourced database security
sqlite
outsourcing
SGX
Webassembly
TEE
Runtime environment
Metrics
C++ languages
Libraries
security
Databases
Cryptography
privacy
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning
Submitted by grigby1 on Fri, 07/29/2022 - 3:48pm
Data Security
outsourced database security
hybrid data partitioning implementation
data sensitivity
data outsourcing
Hybrid power systems
outsourcing
cloud
Metrics
Servers
metadata
information technology
Databases
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves
Submitted by grigby1 on Fri, 07/29/2022 - 3:47pm
encryption
pubcrawl
Human behavior
resilience
Resiliency
Scalability
data privacy
Databases
Memory management
Metrics
Dictionaries
outsourcing
data warehouses
outsourced database security
1
2
3
4
5
6
7
8
9
next ›
last »