Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidentiality
biblio
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Permissioned blockchain Network
medical care providers
medical data items
medical information systems
medical record sharing
Medical services
patient care
patient care-cycle
patient data
patient Emergency relevant medical data
patient visits
patient walk
Peer-to-peer computing
hospitals
prehospital death rates
pubcrawl
Scalability
Scalable blockchain
scalable data source
Scalable Security
secure data source
security of data
Servers
trauma care
trauma centers
emergency medical care
blockchain
blockchain technology
confidentiality
continuous recording system
data audibility
data authentication
data privacy
data scalability
Data Security
distributed ledger
electronic data interchange
annual mortality rate
Emergency medical services
emergency patient death rate
emergency services
emergency-relevant medical data
Fabrics
file transfer methods
health care
health care delivery system
healthcare providers
healthcare settings
high quality prehospital care
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
biblio
Securing Named Data Networks: Challenges and the Way Forward
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
named data networks
security
Resiliency
resilience
pubcrawl
privacy
policy governance
Policy Based Governance
Policy
Access Control
Metrics
integrity
Human Factors
Human behavior
edge computing
confidentiality
collaboration
clean slate
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
code fragments
compiler security
user-mode protection
Transactional memory
software engines
sensitive variables
Peapods
OS-independent memory confidentiality
memory disclosure attacks
memory disclosure attack
DRAM chips
cryptographic keys
Cryptographic Implementation
cryptographic engines
confidentiality
compiler
Scalability
automatic protection
program compilers
Registers
Compositionality
operating systems (computers)
Engines
Random access memory
OS kernel
Data protection
Metrics
pubcrawl
Resiliency
Kernel
encryption
Cryptography
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Symbolic Aggregate Approximation
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
higher detection rates
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
computer network security
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
authentication
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »