Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive information protection
biblio
Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
special big data analytics methods
Sensitivity
sensitive information protection
secure pattern-based data sensitivity framework
patient data
healthcare data
Hadoop distributed file system
Hadoop
Elliptic curves
electronic medical records
data frequency
big data technologies
Scalability
information retrieval
Cryptography
electronic health records
Metrics
parallel processing
Data protection
Big Data
health care
Medical services
Access Control
Resiliency
pubcrawl
Distributed databases
data analysis
security
learning (artificial intelligence)
encryption
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 1:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing