Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Security
biblio
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Submitted by grigby1 on Fri, 08/18/2017 - 2:18pm
Cloud Security
Human behavior
key aggregation cryptosystem
key management
Metrics
pubcrawl
Resiliency
Scalability
security and privacy
sensor network
biblio
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Submitted by grigby1 on Mon, 07/24/2017 - 2:02pm
Cloud Security
Compositionality
key aggregation cryptosystem
Metrics
provable security
pubcrawl
Resiliency
security and privacy
sensor network
biblio
Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
information technology
The New York Times
Service Hijacking
Servers
security of data
Security Incident Management
pubcrawl170109
Organizations
malicious cyber activity
Account Hijacking
cyber-attack
Computer crime
Cloud Security
cloud environment
Cloud Computing
account hijacking prevention
account hijacking analysis
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by BrandonB on Mon, 05/04/2015 - 2:50pm
cloud service providers
Web based applications
Servers
security management
Protocols
internet
Diameter-AAA
diameter AAA mechanisms
Computational modeling
cloud system architecture
authentication
Cloud Security
Cloud Computing
cloud based services
cloud based applications
Browsers
Availability
authorization and accounting
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9