Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data storage
biblio
SecureCSearch: Secure Searching in PDF Over Untrusted Cloud Servers
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
Keyword search
Secure File Sharing
resilience
Resiliency
pubcrawl
untrusted cloud servers
specific files
Shamir's Secret Sharing
Shamir Secret Sharing scheme
SecureCSearch
secure searching
Searching
Portable document format
PDF file
PDF
keyword search operations
Cryptography
information retrieval
incurs minimal computation cost
hacks
encrypted shares
encrypted PDF files
encrypted domain
encrypted cloud data
data leakage
cloud
data storage
storage management
Servers
Cloud Computing
security
encryption
biblio
A Platform for Private and Controlled Spreadsheet Objects Sharing
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
groupware
Secure File Sharing
resilience
Resiliency
pubcrawl
tabular data
spreadsheets collaborative authoring applications
Spreadsheets
Spreadsheet programs
spreadsheet objects sharing
spreadsheet file sharing
sensitive data sharing
Secure spreadsheet data sharing
privacy
office automation
Cryptography
Data visualization
data storage
data integrity
data analysis
confidential data exchange
Computer supported collaborative work
collaborative editing
collaborative analytics
business data processing
storage management
Protocols
data privacy
authorisation
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
Quantum IoT: A Quantum Approach in IoT Security Maintenance
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
quantum mechanics laws
pubcrawl
Quantum approach
quantum channel
quantum communication
quantum computing
quantum computing security
quantum cryptography
quantum cryptography BB84 protocol
Quantum IoT
Protocols
quantum state
Qubit
resilience
Resiliency
Scalability
security of data
Security Processing Security
telecommunication security
greater security design
classical communication
Cloud Computing
complex management
composability
Cryptographic Protocols
data dynamics
data generation process
data storage
BB84 protocol
hybrid management
Internet of Things
IoT security infrastructure
IoT security maintenance
Metrics
One Pad Cryptography
Predictive Metrics
privacy
biblio
Secure Proof of Retrievability System in Cloud for Data Integrity
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
security model
Generators
integrity verification
Metrics
proof of retrievability
pubcrawl
resilience
Resiliency
retrievability system
file upload phase
security of data
Servers
SHA-S12
storage management
tag generation
third party auditor
Third Party Auditor (TPA)
AES encryption
encryption audits
encryption
Databases
data storage
data integrity
Cryptography
computational cost
Compositionality
Cloud storage (CST)
cloud service controller
Cloud Controller (CSC)
Cloud Computing
Cloud Auditing
Ciphers
Application software
biblio
An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
attribute encryption
cloud
Cloud Computing
cloud proxy server
data storage
encryption audits
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
Scalability
trusted authority
user privacy
user privacy in the cloud
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Symbolic Aggregate Approximation
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
higher detection rates
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
computer network security
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
authentication
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
Adaptive models for security and data protection in IoT with Cloud technologies
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Metrics
virtualised sensor nodes
virtual reflection
sensors
sensor-cloud security
sensor-cloud architecture
security
secure association
Resiliency
resilience
Reliability
pubcrawl
Protocols
privacy
multilayer client-server model
Microelectronics Security
adaptive models
IoT
Internet of Things
Hardware
gateways
data storage
Data protection
data privacy
data integrity
computer architecture
composability
cloud technologies
Cloud Computing
authorization
authentication
application servers
« first
‹ previous
1
2
3
4
5
next ›
last »