Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud providers
biblio
Moving Bits with a Fleet of Shared Virtual Routers
Submitted by grigby1 on Tue, 12/01/2020 - 3:36pm
Scalability
Metrics
networking community
offloading network functionality
on-demand instances
Policy Based Governance
price disparity
Pricing
pubcrawl
resilience
Resiliency
IP transit prices
shared virtual routers
telecommunication network routing
telecommunication network topology
third-party cloud spot instances
traffic demands
transit providers
unit pricing
virtual network provider
virtualisation
Economics
bandwidth costs
Cloud Computing
cloud providers
cloud-assisted networks
collaboration
composability
computing resources
data transfer
data transfers
dedicated resources
Bandwidth
flexible network service chains
Human behavior
Human Factors
internet
Internet core hubs
Internet ecosystem
Internet-scale Computing Security
Internet-scale interconnections
IP networks
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
uniform distribution
telecommunication security
Shamirs secret sharing scheme
set theory
Resiliency
resilience
pubcrawl
Protocols
polynomials
polynomial
multifactor authentication
Analytical models
malicious dealer
interpolation
Human Factors
Human behavior
detect hidden sets
Cryptography
Cryptographic Protocols
cryptographic keys
Computers
Computational modeling
cloud providers
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 10:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
biblio
Secured and Reliable File Sharing System with De-Duplication Using Erasure Correction Code
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Reliability
file-level deduplication system
file sharing system
File systems
Human behavior
Metrics
optimized storage
Peer-to-peer computing
pubcrawl
Reed Solomon Code
error correction codes
resilience
Resiliency
RSA encryption
Secure File Sharing
Secure storage
Servers
storage management
storage space
video files
Cryptography
authorized storage
Ciphers
cipher texts
Cloud Computing
cloud providers
cloud service subscriber
cloud storage servers
composability
computer network reliability
AES encryption
data deduplication technique
data encryption
data owners
de-duplication
encrypted file reliability
encrypted files
encryption
erasure correcting code
erasure correction code
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
A Taxonomic Perspective on Certification Schemes: Development of a Taxonomy for Cloud Service Certification Criteria
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
cloud service certification criteria
taxonomy
taxonomic perspective
structural characteristics
standards
security
Interviews
CSC initiatives
CSC design
audit process
cloud providers
cloud computing standards
Cloud Computing
certifiers
certification schemes
certification
Business