Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
query processing
biblio
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
ciphertexts
searchable encryption
searchable symmetric encryption
searchable encryptions
queried keyword
matrix-type storage
matrix-type data format
matrix-type data
location-based search
Keyword search
IoT technologies
encrypted domain
encrypted documents
data outsourcing
cloud storages
resilience
Block Cipher
advanced searchable encryption
outsourcing
personal information
Ciphers
information retrieval
storage management
query processing
Cryptography
Servers
Indexes
composability
Resiliency
pubcrawl
biblio
Using a Robust Metadata Management System to Accelerate Scientific Discovery at Extreme Scales
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
-EMPRESS
Metadata Discovery Problem
software fault tolerance
scientific discovery
scale-up scientific applications
query functionality
Production systems
metadata management system
Fault tolerant systems
EMPRESS 2.0
EMPRESS 1.0
custom-metadata
atomic operations
Acceleration
-SIRIUS
Scalability
-descriptive-metadata
-Decaf
-data-tagging
-ATDM
storage management
meta data
fault tolerance
Analytical models
metadata
query processing
Computational modeling
composability
pubcrawl
Resiliency
biblio
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
composability
data integrity
fine-grained access control
Human behavior
Human Factors
Metrics
policy-based governance
Outsourced Database Integrity
pubcrawl
query processing
resilience
Resiliency
Scalability
zero trust
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
Efficient Astronomical Query Processing Using Spark
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
Resiliency
Human behavior
pubcrawl
privacy
Metrics
SQL injection
astronomical survey data management
Big Data
query processing
spark framework
policy-based-governance
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Adaptive Cache Replacement in Efficiently Querying Semantic Big Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
knowledge bases querying
web services
triplestore
semantic Big Data querying
relational databases
RDF Caching
RDBMS
query response
query processing
query log
LRU
Linked Data
LFU
least recently used
least frequently used
Big Data
knowledge based systems
forecast method
exponential smoothing
Cache replacement
adaptive cache replacement policy
ACR policy
Web Caching
cache storage
Conferences
Scalability
Resiliency
Metrics
pubcrawl
biblio
Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
privacy
unforgeable searchable encrypted audit logs
unforgeability
Servers
searchable encryption
Resiliency
resilience
remote servers
query processing
public key encryption with keyword search
public key cryptography
pubcrawl
Privacy-preserving
encryption audits
peks
Metrics
IP networks
fine-grained conjunctive query
encryption
data privacy
Compositionality
cloud storage
Cloud Computing
auditing
audit log
biblio
Differential privacy-based data de-identification protection and risk evaluation system
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
Human behavior
value added analysis
Synthetic Dataset
Scalability
risk evaluation system
Resiliency
query processing
pubcrawl
privacy-sensitive data
privacy protection issues
native differential privacy
Big Data
differential privacy-based data de-identification protection
differential privacy
de-identification
data query
Data protection
data privacy
Data mining
data disclosure estimation system
data de-identification process
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »