Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
APDPk-Means: A New Differential Privacy Clustering Algorithm Based on Arithmetic Progression Privacy Budget Allocation
Submitted by aekwall on Mon, 01/06/2020 - 10:36am
k-means algorithm
Sensitivity
security of data
Scalability
resource management
Resiliency
pubcrawl
privacy protection
privacy budgets
privacy budget allocation
privacy
pattern clustering
optimisation
network information security
network data mining
APDPk-means
iterative process
Iterative methods
Human behavior
differential privacy k-means
differential privacy clustering algorithm
differential privacy
Data protection
Data mining
data clustering
composability
Clustering algorithms
Big Data
arithmetic progression privacy budget allocation
biblio
A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
data privacy
Resiliency
privacy protection
privacy disclosure issue
privacy
precise clustering results
pattern clustering
Human behavior
distortion
distancebased clustering
distance-based clustering
differential privacy-based protecting data preprocessing method
differential privacy budget parameter
differential privacy
big data privacy
Data preprocessing
Data mining
data distortion technique
composability
Clustering algorithms
big data mining
adaptive privacy budget parameter adjustment mechanism
adaptive mechanism
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Submitted by aekwall on Mon, 12/16/2019 - 1:46pm
Indexes
threshold cryptography
system reliability
Servers
secret sharing
resilience
pubcrawl
privacy protection
privacy
Mathematical model
life cycle
internet
Instant messaging
data deletion
Human behavior
hash collision
frequent colliding hash table
FlashGhost
data self destructing
Data Sanitization
data privacy
Cryptography
computer network security
computer network reliability
Compositionality
automatic data sanitization system
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Submitted by aekwall on Mon, 11/11/2019 - 11:48am
Android mobile platform
User input
user data collection
private information
privacy-relevant app categories
privacy policy claims
privacy policy alignment
privacy leaks detection
Mobile privacy policy
Humanoid robots
graphical user interfaces
app producers
app code
Androids
Scalability
Android ecosystem
Android apps
Android applications
Android application
privacy protection
Privacy Policies
Layout
privacy
pubcrawl
Human behavior
mobile computing
Ontologies
data privacy
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
Protecting Privacy with a Declarative Policy Framework
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
privacy policy framework
formal verification
Human behavior
Ontologies
policy decision point
privacy
privacy enhancing technologies
Privacy Policies
privacy policy creation
privacy policy decision engine
privacy policy engine decisions
Formal Specification
privacy policy management
privacy policy validation
privacy protection
pubcrawl
Scalability
security of data
Semantics
technical details
user interfaces
Common Data Model
Resiliency
-Automated-reasoning
-Data-sharing
-Ontology
-Policy
-Policy-Decision-Engine
-Privacy-Framework
-Reasoning
-Rule
-Semantic-Technology
Computing Theory and Privacy
Cryptography
Data models
data privacy
Databases
declarative policy framework
Engines
enterprise privacy prototype system
expressive policy specification
formal shareability theory
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »