Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
organization
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
A Hybrid Data Access Control Using AES and RSA for Ensuring Privacy in Electronic Healthcare Records
Submitted by grigby1 on Thu, 07/08/2021 - 1:37pm
Organizations
user privacy in the cloud
user privacy
Semi-Trusted Authority
Scalability
Rule Based Engine
Resiliency
resilience
Registers
public cloud
pubcrawl
outsourcing
Access Control
organization
Metrics
Engines
Designation
data privacy
data owners
Cloud Computing
cloud
Authorized Cloud
Audit request
Attributes
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 1:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
bench4gis: Benchmarking Privacy-aware Geocoding with Open Big Data
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
Big Data Applications
big data privacy
viable geocoding strategies
surrogate data
privacy-aware geocoding solutions
patient privacy laws
open big data sets
Law
institutional regulations
healthcare data
Geospatial analysis
geographic information systems
geographic data
geographic coordinates
external transmission
Scalability
bench4gis
organization
Open Source Software
sensitive data
Benchmark testing
Human Factors
quality assurance
Metrics
pubcrawl
Resiliency
Medical services
privacy concerns
data privacy
Big Data
biblio
The correlation between intellectual property management and quality management in the modern knowledge-based economy
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
Technological innovation
quality policy
quality policies
quality management
organization
Management
knowledge-based economy
knowledge based systems
knowledge based economy
intellectual property policies
intellectual property management
industrial knowledge-based organization
Economics
design activities
ip protection
Organizations
Metrics
knowledge management
Law
composability
Standards organizations
intellectual property
industrial property
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
organisational aspects
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
Cloud Computing: A Paradigm of More Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 10:22am
Resiliency
resilience
pubcrawl
policy-based governance
outsource
organization
Metrics
insider threat
insider
Human behavior
detection
collaboration
Cloud Computing
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking