Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourcing
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
attribute certificate
collaboration
updating distributing keys
role-based access control
RBAC
Performance
key update
existing CP-ABE based schemes
efficient key update function
efficient data Access Control
data outsourcing environment
CP-ABE policy
Ciphertext Policy - Attribute-based Encryption
Attribute certificate management
Cryptography
access request
access control model
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Access Control
CP-ABE
policy-based governance
pubcrawl
Conferences
Scalability
outsourcing
Cloud Computing
authorisation
biblio
A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
attribute base encryption
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy hiding
outsourced environment
mobile terminals
mobile end
lightweight decryption
data outsourcing (key words)
CP-ABE scheme
component
attributes revocation
attribute revocation
Ciphers
algorithm analysis
CP-ABE
policy-based governance
pubcrawl
outsourcing
Scalability
Servers
authorisation
Access Control
encryption
Cryptography
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
policy-based governance
hidden access structures
cloud-based cryptographic system
cloud service provider
anonymous attribute-based encryption
anonymous attribute-based access control system
access structure update
personal data
fine-grained access control
outsourcing
cryptology
Metrics
Cloud Computing
pubcrawl
Human behavior
Resiliency
Proxy re-encryption
data privacy
data owner
attribute-based encryption
data confidentiality
Cryptography
authorisation
Scalability
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »