Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data owner
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
policy-based governance
hidden access structures
cloud-based cryptographic system
cloud service provider
anonymous attribute-based encryption
anonymous attribute-based access control system
access structure update
personal data
fine-grained access control
outsourcing
cryptology
Metrics
Cloud Computing
pubcrawl
Human behavior
Resiliency
Proxy re-encryption
data privacy
data owner
attribute-based encryption
data confidentiality
Cryptography
authorisation
Scalability
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 11:28am
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
A Security Problem in Cloud Auditing Protocols
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
auditing
Security Audits
subverted auditing protocol instantiation
subverted auditing frame
subversion attack
publity
PRISM
Mikhail Bellare
cloud auditing protocols
cloud auditing protocol
basic security model
Cloud Computing
secret information
Scalability
cloud server
security problem
pubcrawl
Human behavior
Resiliency
data owner
Cryptography
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Empowering Owners with Control in Digital Data Markets
Submitted by aekwall on Mon, 01/20/2020 - 10:44am
Distributed databases
smart contracts
smart contract
Selective Encryption
Resiliency
pubcrawl
Predictive Metrics
Key derivation
encryption audits
authorisation
digital data markets
Digital data market
data owner
Cryptographic Protocols
Compositionality
blockchain-based interaction protocol
blockchain
authorized users
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword
biblio
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers
Submitted by grigby1 on Wed, 03/06/2019 - 3:27pm
cloud storage service
users space
store big data
storage management
single cloud storage
Servers
pubcrawl
multiple cloud storage provider
multiple cloud providers
metadata
meta data
local storage
insider attack
data privacy
data owner
Cryptography
Intelligent Data and Security
cloud service
Cloud Security
Cloud Computing
bit data center
big data privacy
big data file
Big Data
authorisation
asymmetric security concept
asymmetric secure storage scheme
Scalability
Resiliency
Compositionality
Intelligent Data Security
1
2
next ›
last »