Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Security
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers
Submitted by grigby1 on Wed, 03/06/2019 - 4:27pm
cloud storage service
users space
store big data
storage management
single cloud storage
Servers
pubcrawl
multiple cloud storage provider
multiple cloud providers
metadata
meta data
local storage
insider attack
data privacy
data owner
Cryptography
Intelligent Data and Security
cloud service
Cloud Security
Cloud Computing
bit data center
big data privacy
big data file
Big Data
authorisation
asymmetric security concept
asymmetric secure storage scheme
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Autonomic Secure HPC Fabric Architecture
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
HPC fabric architecture
Software
security of data
security management
security
resilient computing
Resiliency
resilience
pubcrawl
parallel processing
Omni-Path Fabric
anomaly analysis
High performance computing
Hardware
Frequency modulation
Fabrics
fabric industries
computer architecture
composability
Cloud Security
Cloud Computing
Autonomic Security
biblio
Secure, Consistent, and High-Performance Memory Snapshotting
Submitted by grigby1 on Thu, 02/14/2019 - 11:17am
Cloud Security
Forensics
Hardware Security
Human Factors
malware and unwanted software
Metrics
pubcrawl
Scalability
Tamper resistance
biblio
Taking Control of SDN-Based Cloud Systems via the Data Plane
Submitted by grigby1 on Fri, 02/08/2019 - 4:31pm
openstack
Virtual Switches
SDN security
SDN
Scalability
rop attacks
ROP
Resiliency
resilience
pubcrawl
Packet Parsing
attack surface
Open vSwitch
NFV
network virtualization
Network Isolation
MPLS
Metrics
data plane security
Cloud Security
Attacker Models
biblio
Policy Injection: A Cloud Dataplane DoS Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:31pm
attack surface
Cloud Security
DoS
Metrics
OVS
policy injection
pubcrawl
resilience
Resiliency
Scalability
biblio
Latent Typing Biometrics in Online Collaboration Services
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
authorship attribution
cloud
cloud forensics
Cloud Security
keystroke dynamics
Metrics
multifactor authentication
online collaboration
privacy
pubcrawl
resilience
Resiliency
Scalability
typing biometrics
user privacy
user privacy in the cloud
biblio
CloudI: Cloud Security Based on Cloud Introspection
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
cloud
Cloud Introspection Technology
Cloud Probe
Cloud Security
Introspection Cloud
Metrics
pubcrawl
resilience
Resiliency
Scalability
user privacy
user privacy in the cloud
biblio
Hyperagents: Migrating Host Agents to the Hypervisor
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
Cloud Security
composability
Computer Forensics
Human behavior
Metrics
privacy
pubcrawl
Resiliency
virtual machine introspection
virtualization privacy
biblio
Cloud Storage File Recoverability
Submitted by grigby1 on Mon, 12/03/2018 - 12:18pm
pubcrawl
Cloud Security
cloud storage
Metrics
proofs of recoverability
proofs of retrievability
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »