Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data access
biblio
Secured Health Data Access in Cloud Computing Using Multiple Attribute-Based Encryptions
Submitted by aekwall on Tue, 01/25/2022 - 2:52pm
Access Data
attribute-based encryption
CC
Cloud Computing
Computers
data access
encryption
Human behavior
policy-based governance
Protocols
pubcrawl
Scalability
Secure storage
security issues
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
Data Caching Optimization in the Edge Computing Environment
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
mobile users
information retrieval
Integer Problem (IP)
integer programming
integer programming problem
Metrics
mobile computing
mobile data traffic
mobile devices
Energy Efficiency
network delay reduction
Page-Hinckley-Test (PHT)
resilience
Resiliency
Scalability
service provider
Web Caching
pubcrawl
edge servers
edge computing environment
edge computing
delays
data popularity
data optimization
data handling
data caching problem
data caching optimization
data cache problem
data access latency
data access
Cloud Computing
centralized cloud
cache storage
biblio
Enabling the Verification of Computational Results: An Empirical Evaluation of Computational Reproducibility
Submitted by aekwall on Mon, 09/23/2019 - 9:41am
data access
Resiliency
Human behavior
pubcrawl
composability
Metrics
Provenance
code access
reproducibility policy
reproducible research
workflows
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
A blockchain-based data usage auditing architecture with enhanced privacy and availability
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
distributed infrastructures
untrusted servers
unauthorized users
tamper-proof evidences
security breaches
Resiliency
resilience
pubcrawl
Proposals
privacy-preserving fashion
Peer-to-peer computing
network accountability
Metrics
hierarchical identity based cryptographic mechanisms
auditable contracts
data usage compliance
data sharing
data privacy
data owners
data access
Cryptography
contracts
composability
blockchain-based data usage auditing architecture
blockchain infrastructures
authorization
authorisation
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
1
2
next ›
last »