Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud environment
biblio
A Dynamic and Secure Migration Method of Cryptographic Service Virtual Machine for Cloud Environment
Submitted by grigby1 on Thu, 05/12/2022 - 9:49am
quality of service
secure migration
dynamic migration
cryptographic service virtual machine
virtual machine security
cyber physical systems
resilience
cloud environment
Virtual machining
Cryptography
composability
process control
Access Control
Analytical models
Software
Resiliency
pubcrawl
Cloud Computing
biblio
Negative Feedback Dynamic Scheduling Algorithm based on Mimic Defense in Cloud Environment
Submitted by aekwall on Wed, 07/07/2021 - 4:11pm
mimic defense
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
negative feedback control
Negative feedback
Monitoring
Heuristic algorithms
Dynamic scheduling
cloud environment
Virtual machining
real-time systems
Cloud Computing
privacy
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 10:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
biblio
Security validation testing environment in the cloud
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
microsoft windows
big data security metrics
security validation testing environment
MS Azure
log analysis
cybersecurity vulnerabilities
resilience
Proposals
cloud environment
tools
computer security
Scalability
Resiliency
pubcrawl
Servers
Cloud Computing
security of data
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
cloud environment
user privacy in the cloud
user attributes protection
SPs
Services and user’s privacy
pseudonymous technique
pseudoattributes values
privacy token technique
Privacy Token
personal identifiable information
Java programming language
federated identity management system
CloudAnalyst simulation
attributes privacy protection
Cloud Computing
privacy risks
Scalability
cloud
Java
service providers
risk management
Data protection
Metrics
privacy
pubcrawl
Resiliency
authorisation
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
1
2
3
next ›
last »