Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data outsourcing
biblio
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System
Submitted by grigby1 on Fri, 07/29/2022 - 3:49pm
Access Control
outsourced database security
statistic query
data outsourcing
searchable encryption
differential privacy
Histograms
Metrics
Databases
pubcrawl
data privacy
Cryptography
privacy
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning
Submitted by grigby1 on Fri, 07/29/2022 - 3:48pm
Data Security
outsourced database security
hybrid data partitioning implementation
data sensitivity
data outsourcing
Hybrid power systems
outsourcing
cloud
Metrics
Servers
metadata
information technology
Databases
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing
Submitted by grigby1 on Thu, 02/10/2022 - 2:17pm
Distributed databases
Databases
data sensitivity
data outsourcing
data centers
cloud
Sensitivity
security
outsourcing
hybrid data partitioning
encryption
biblio
Secure Reverse k-Nearest Neighbours Search over Encrypted Multi-dimensional Databases
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
Scalability
pubcrawl
encryption
Human Factors
Predictive Metrics
cloud database services
confidential multi-dimensional data retrieval
data outsourcing
secure cloud computing
game theoretic security
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
ciphertexts
searchable encryption
searchable symmetric encryption
searchable encryptions
queried keyword
matrix-type storage
matrix-type data format
matrix-type data
location-based search
Keyword search
IoT technologies
encrypted domain
encrypted documents
data outsourcing
cloud storages
resilience
Block Cipher
advanced searchable encryption
outsourcing
personal information
Ciphers
information retrieval
storage management
query processing
Cryptography
Servers
Indexes
composability
Resiliency
pubcrawl
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
Submitted by grigby1 on Fri, 08/18/2017 - 12:55pm
composability
data outsourcing
efficient encryption
Homomorphic encryption
homomorphic mac
pubcrawl
Resiliency
verifiable computation
biblio
Challenges to network forensics in cloud computing
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
challenges to network forensics in cloud
Cloud architecture
Cloud Computing
Computational modeling
computer architecture
data outsourcing
data privacy
digital control
Digital Forensics
network forensics
network forensics in cloud
outsourcing
pubcrawl170109
security
Software Architecture
telecommunication traffic
biblio
Identity-based remote data possession checking in public clouds
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
certificate management elimination
Cloud Computing
cloud server
Cryptographic Protocols
data outsourcing
ID-RDPC protocol
identity-based RDPC protocols
identity-based remote data possession checking protocol
PKI setting
public cloud storage
public key cryptography
public key infrastructure
spam
standard computational Diffie-Hellman problem
storage management
unsolicited e-mail