Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer access
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 3:08pm
Science of Security
computer access
Cybersecurity
Science of Human Circumvention of Security
Science of Security
Workarounds
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
file
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 12:44pm
Science of Security
computer access
Cybersecurity
Science of Security
Workarounds
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Submitted by awhitesell on Wed, 02/15/2017 - 12:40pm
Science of Security
Science of Security
Workarounds
Cybersecurity
computer access
workflow
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security