Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public cloud
biblio
A Hybrid Data Access Control Using AES and RSA for Ensuring Privacy in Electronic Healthcare Records
Submitted by grigby1 on Thu, 07/08/2021 - 1:37pm
Organizations
user privacy in the cloud
user privacy
Semi-Trusted Authority
Scalability
Rule Based Engine
Resiliency
resilience
Registers
public cloud
pubcrawl
outsourcing
Access Control
organization
Metrics
Engines
Designation
data privacy
data owners
Cloud Computing
cloud
Authorized Cloud
Audit request
Attributes
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 1:02pm
learning activities
teaching
Servers
Security Programming
security of data
public cloud
pubcrawl
Programming profession
programming languages
programming assignments
program testing
program debugging
private cloud
privacy
networking course
Network Programming
Cloud Computing
Laboratories
innovative design
innovate practice
Hands-On Laboratory
educational courses
education
cybersecurity education
cybersecurity course
cyber physical systems
course learning objectives
computer security
computer science education
computer aided instruction
cloud-based labs
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 1:35pm
k-NN search schemes
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
authorized data users
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
Cryptography
nearest neighbor search
k-nearest neighbor search
search problems
data storage
security property
nearest neighbour methods
Measurement
Metrics
Security analysis
Cloud Computing
data privacy
Mathematical model
matrix algebra
pubcrawl
authorisation
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
biblio
One Quantifiable Security Evaluation Model for Cloud Computing Platform
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
public cloud
visualization
visual graphs
visual display module
System recovery
Security Visualization
security view
security situation
security scanning engine
security recovery engine
security of data
security
Resiliency
resilience
quantifiable security evaluation model
quantifiable evaluation
API
pubcrawl
private cloud
multiple clouds
mixed cloud
maintenance engineering
graph theory
G-Cloud platform
Engines
dynamic security scanning score
Computational modeling
cloud resources
cloud computing platform
Cloud Computing
application security
application program interfaces
biblio
Enhancing security of Hadoop in a public cloud
Submitted by drwright on Wed, 05/04/2016 - 8:07am
internal cloud attacks
Vulnerability and Resilience Prediction Models
Virtual machine monitors
SEHadoop
security enhancement
security
resilience
public cloud
parallel processing
overloaded authentication key
least access privilege
lack of fine-grained access control
Access Control
Hadoop security mechanism
fine-grained access control
Data processing
data access
Containers
compromise resilience
Cloud Computing
authorisation
authentication key
authentication
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 12:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob