Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed access control
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 4:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 11:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication