Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud computing services
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 12:33pm
Scalability
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
policy-based governance
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
composability
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
Analytical models
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols
biblio
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
Data mining
security of data
Resiliency
resilience
pubcrawl
Proof-of-work
power grid vulnerability analysis
power grid system
pool reward mechanisms
pool mining
Peer-to-peer computing
Metrics
distributed ledger
Distributed databases
data provenance
block mining
data integrity
Cryptography
Computational modeling
Compositionality
composability
cloud computing services
Cloud Computing
BWH attack
blockchain security and vulnerability
blockchain security
blockchain cloud
blockchain
block withholding attack
block withholding
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model