Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
database queries
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 2:43pm
social media
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
Oak Ridge National Laboratory
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
Databases
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
atmospheric radiation measurement data center
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities