Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourcing
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 12:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 5:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
biblio
EARRING: Efficient Authentication of Outsourced Record Matching
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
integrity
VO
verification object
third-party server
specific distance metrics
Servers
security
Resiliency
record matching
pubcrawl
outsourcing paradigm
outsourcing
outsourced record matching framework
outsourced dataset
Outsourced Database Integrity
Cloud Computing
Information Reuse
information integration
identifying matching records
Euclidean distance
Entity Resolution
design EARRING
data privacy
data management
authentication
Big Data
correct record matching results
data integrity
Big Data Analytics
big data security metrics
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 11:41am
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »