Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption audits
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
Computer crime
Cloud Computing
encryption
Access Control
attribute-based encryption
Data models
DDoS Attacks
Resiliency
pubcrawl
Computational modeling
Predictive Metrics
Compositionality
data sharing
pay-as-you-go model
encryption audits
biblio
SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
Resiliency
pubcrawl
Predictive Metrics
Compositionality
Cloud computing security auditing
data anonymization
privacy preserving
encryption audits
biblio
Pump Up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Submitted by grigby1 on Mon, 08/05/2019 - 11:31am
efficient encryption
Compositionality
cryptanalysis
encrypted databases
encryption audits
Metrics
pubcrawl
resilience
Resiliency
biblio
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
efficient encryption
backward security
Compositionality
encryption audits
Metrics
pubcrawl
puncturable encryption
resilience
Resiliency
searchable encryption
symmetric searchable encryption
biblio
Secure Proof of Retrievability System in Cloud for Data Integrity
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
security model
Generators
integrity verification
Metrics
proof of retrievability
pubcrawl
resilience
Resiliency
retrievability system
file upload phase
security of data
Servers
SHA-S12
storage management
tag generation
third party auditor
Third Party Auditor (TPA)
AES encryption
encryption audits
encryption
Databases
data storage
data integrity
Cryptography
computational cost
Compositionality
Cloud storage (CST)
cloud service controller
Cloud Controller (CSC)
Cloud Computing
Cloud Auditing
Ciphers
Application software
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
encryption audits
windows server instance
third party auditor
storage management
Servers
security issues
secure hash algorithm
secure auditing system
Resiliency
resilience
public auditing
pubcrawl
privacy preserving
Metrics
metadata
advanced encryption standard algorithm
encryption
data storing
data privacy
data integrity
data confidentiality
Cryptography
Compositionality
cloud service providers
cloud data security
cloud data
Cloud Computing
auditing
Amazon EC2 cloud
biblio
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Submitted by aekwall on Wed, 02/13/2019 - 12:01pm
efficient encryption
Attack vectors
encryption audits
hidden vector encryption
Human behavior
leakage profile
pubcrawl
Resiliency
Scalability
searchable encryption
biblio
Marble: Making Fully Homomorphic Encryption Accessible to All
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
Asymmetric Encryption
composability
Compositionality
encrypted applications
encryption audits
homomorphic encryption schemes
Human behavior
Metrics
pubcrawl
resilience
Resiliency
biblio
An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
attribute encryption
cloud
Cloud Computing
cloud proxy server
data storage
encryption audits
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
Scalability
trusted authority
user privacy
user privacy in the cloud
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »