Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud computing security
biblio
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions
Submitted by grigby1 on Mon, 05/22/2017 - 2:07pm
assured deletion
Cloud Computing
cloud computing security
data deletion
Human behavior
Metrics
pubcrawl
public cloud computing
secure deletion
threat vectors
user assurances
biblio
Dynamic Execution of Secure Queries over Homomorphic Encrypted Databases
Submitted by grigby1 on Wed, 03/29/2017 - 12:40pm
boolean circuits
cloud computing security
composability
Homomorphic encryption
Metrics
privacy
pubcrawl
Resiliency
white box
white box cryptography
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
« first
‹ previous
1
2
3
4