Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy concern
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Preserving Privacy in Convolutional Neural Network: An ∊-tuple Differential Privacy Approach
Submitted by aekwall on Mon, 06/22/2020 - 11:20am
Deep Neural Network
ϵ-tuple differential privacy approach
Training data
significant accuracy degradation
salient data features
reusable output model
privacy preserving model
privacy concern
model inversion attack
model buildup data
financial data
deep neural networks
complex data features
medical data
CNN model
differential privacy
Cloud Computing
transfer learning
image recognition
convolutional neural network
convolutional neural nets
CNN
privacy
classification
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
Scalability
biblio
An Optimal Fully Homomorphic Encryption Scheme
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Kronecker product
user data protection
tensor theory
system analysis and design
security concern
Scalability
Resiliency
resilience
pubcrawl
privacy concern
privacy
optimal fully homomorphic encryption scheme
O-FHE scheme
Mathematical model
Algorithm design and analysis
KP
human factor
Human behavior
fully homomorphic encryption
FHE scheme
encryption
distributed computing
Data processing
Cybersecurity
Cryptography
Computing Theory
Cloud Computing
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 12:47pm
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity