Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
relational databases
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
RDBMS
unexpected results
Springs
relational database management system
relational algebra operations
relational algebra
query inversion techniques
Physics
mathematical formulations
mathematical formulation
inversion queries
inverse queries
Data-Intensive Applications
data provenance tracking
data provenance finding
data origin
History
data provenance
Provenance
Flowcharts
relational databases
finance
Databases
database
query processing
Metrics
biology
composability
pubcrawl
Human behavior
Resiliency
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Training
temporal data ex-filtration threat detection
Temporal Attacks
Insider Threats
Data Analytics for Security
anomaly detection techniques
anomalous access detection
relational database security
unauthorized access
relational databases
data theft
Anomaly Detection
Inspection
query processing
Metrics
composability
pubcrawl
Human behavior
Resiliency
feature extraction
real-time systems
authorisation
Monitoring
biblio
Anomaly Detection in Role Administered Relational Databases — A Novel Method
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
relational databases
User profile
security feature
Role-Based Access Control database
Role administered relational databases
Quiplet
database management systems
database management system
database access control
common security measures
anomaly detection technique
anomaly detection system
access control measures
relational database security
authorisation
Intrusion Detection
Anomaly Detection
Training
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Support vector machines
support vector machine
Access Control
« first
‹ previous
1
2
3
4
5
6
next ›
last »