Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data storage
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Towards a secure smart grid storage communications gateway
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
internetworking
telecommunication security
standards
smart power grids
Smart Grids
Smart Grid Privacy
security requirements
secure smart energy communications devices
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy issues
machine-to-machine communication
Logic gates
authentication
ICT system
Human Factors
Human behavior
HORIZON 2020 project STORY
hands-on configuration advice
Energy storage
Energy Efficiency
electric storage technologies
data storage
cyber-physical systems
cyber security measures
Cryptography
communications gateway
communication line security
backend M2M communications protocols
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
biblio
Smart and secure data storage using Encrypt-interleaving
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human behavior
unsecure channel
turbo codes
Resiliency
public key cryptography
pubcrawl
private key cryptography
privacy
Policy
Human Factors
channel coding
encryption
encrypt-interleaving
data storage
Data Sanitization
Convolutional codes
Compositionality
collaboration
Cloud Security
Cloud Computing
biblio
Adding Support for Theory in Open Science Big Data
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive Analytics
Frameworks
functional data analysis
Human behavior
Human Factors
Mathematical model
Metrics
natural sciences computing
open science big data
Economic indicators
Principal differential analysis
Provenance
pubcrawl
Resiliency
storage management
theory
theory formation
Analytical models
data transfer
data storage
data sources
data provenance
data privacy
Data models
data fitting
data curation
data analysis
Compositionality
composability
citable reusable data
Biological system modeling
Big Data Analytics
Big Data
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 2:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 10:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime
« first
‹ previous
1
2
3
4
5
next ›
last »