Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Security
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Multi-Level Proactive Security Auditing for Clouds
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
proactive auditing
security policy verification
security of data
Security Audits
security auditing
Scalability
runtime cloud security auditing
Resiliency
pubcrawl
Cloud Computing
multilevel proactive security auditing system
Multi-Level Security
Human behavior
formal verification
Data protection
cloud tenant protection
Cloud Security
file
Safeguarding Mobile Cloud Services New Challenges and Solutions
Submitted by XiaoFeng Wang on Wed, 01/08/2020 - 4:18pm
Project Slides
Software
Systems
Cloud Security
Mobile Security
IoT security
1618493
SaTC PI Meeting 2019
biblio
On the Universally Composable Security of OpenStack
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Cloud Security
composability
Modular Security Analysis
openstack
pubcrawl
universal composability
biblio
Research on Storage Mechanism of Cloud Security Policy
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
cloud security policy
Security Policies Analysis
XML
storage mechanism
security policy
Secure storage
popular policy repositories
policy storage technology
policy repository
policy information
Key Words: Cloud Computing
Formal concept analysis
security of data
cloud computing security
storage management
Cloud Security
relational databases
Lattices
testing
policy-based governance
pubcrawl
cloud storage
Cloud Computing
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
Submitted by aekwall on Mon, 09/23/2019 - 10:26am
digital signature
Cryptography
Resiliency
pubcrawl
Cloud Security
Predictive Metrics
remote data audit
provable security
Compositionality
biblio
A Unified Cybersecurity Framework for Complex Environments
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
Scalability
Resiliency
Cybersecurity
security architecture
pubcrawl
Cloud Security
case study
integrated capability management
Information Centric Networks
biblio
Enhancing Cloud Security Using Advanced MapReduce K-means on Log Files
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
predictive security metrics
Cloud Security
Deviation metric
k-means
log files
MapReduce
Metrics
pubcrawl
Security Metrics
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »