Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud service
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Towards an Efficient File Synchronization between Digital Safes
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Protocols
WebSocket protocol
WebSocket
web services
trees (mathematics)
synchronization protocol efficiency
Synchronization
SyncDS protocol
storage management
Servers
security
Secure File Sharing
Resiliency
resilience
pubcrawl
Cloud Computing
Networking Protocol
Metrics
metadata
Human behavior
HTML5 Local Storage API
hierarchical hash tree
file synchronization
Digital Safe
Cryptographic Protocols
Context
composability
cloud storage solutions
cloud service
biblio
Design and analysis of high performance crypt-NoSQL
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
NoSQL databases
YCSB
Yahoo
storage management
SQL
Service Level Agreement
security scalability
security
secure data encryption
Scalability
relational databases
relational database security
query processing
pubcrawl
Performance
Benchmark testing
NoSQL
necessary data security
middleware layer
middleware
high performance crypt-NoSQL
encryption
Data Security
Cryptography
cryptographic methods
cloud service benchmark
cloud service
Cloud Computing
Cassandra
Big Data
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Teaching and Training Cybersecurity as a Cloud Service
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
GenCyber camps
virtualization technologies
Virtualization
virtualisation
virtual cybersecurity experiments
virtual cloud services
Servers
security of data
pubcrawl170109
Protocols
Network interfaces
IT infrastructures
IoT
Internet of Things
Internet connectivity
graduate students
and cloud computing
educational courses
education
cybersecurity training
cybersecurity teaching
cybersecurity lab as a service
cybersecurity experiments
cyber resources
computer science education
Computer crime
computer aided instruction
cloud service
cloud computing systems
Cloud Computing
CLaaS
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 1:53pm
directory services
virtual shared servers
user authorization
token management system
token granting
Servers
security as a service
mutual authentication
internet
Educational institutions
Access Control
Databases
data correctness
Computers
cloud service
Cloud Computing
authorisation
authentication
access rights
« first
‹ previous
1
2