Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 10:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Submitted by aekwall on Mon, 10/19/2020 - 11:08am
Key Policy Attribute Based Encryption (KP-ABE)
trust
tradition access control
Scalability
Resiliency
public key cryptography
pubcrawl
privacy protection laws
privacy
KP-ABE
key policy attribute-based encryption
Access Control
hierarchical encryption
encryption
edge computing
Data Security
data privacy
cloud computing service
Cloud Computing
basic ABE
authorisation
attribute-based encryption
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 10:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
Internet of Things
Security Metrics
security functions
security as a service
pubcrawl
placement optimization
Metrics
IoT security solutions
IoT security framework
IoT network
IoT
Centrality
graph theory
EndToEnd like encryption
edge computing security
edge computing
dominating set
Cryptography
Computing Theory
computer network security
centrality metrics
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
cyber physical systems
CPS Privacy
secure estimation scheme
Secure control design
privacy-enabled secure control
observer-based secure control problem
Luenberger observer
fog computing aided CPS
Fog computation
FCA-CPS
Data Perturbation
complicated computation
industrial process
Covariance matrices
Linear systems
Cryptography
Observers
Perturbation methods
fog layer
Human Factors
edge computing
security threats
privacy
pubcrawl
Human behavior
cyber-physical systems
distributed processing
data privacy
encryption
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
Submitted by aekwall on Mon, 09/28/2020 - 10:42am
medical information systems
off-chain edge nodes
hyperledger composer fabric blockchain
hybrid blockchain-edge architecture
hybrid architecture
global electronic health record market
EHR privacy
EHR data management
blockchain-based controller
blockchain-based access control logs
access control policies
Access Control List
distributed ledger
transaction processing
Fabrics
edge computing
Scalability
health care
blockchain security
hyperledger
smart contracts
Distributed databases
smart contract
blockchain
pubcrawl
Resiliency
computer architecture
Medical services
data privacy
Access Control
authorisation
attribute-based access control
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »