Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud data
biblio
A Forensic Methodology for the Analysis of Cloud-Based Android Apps
Submitted by grigby1 on Mon, 06/13/2022 - 3:38pm
security
Servers
pubcrawl
resilience
Resiliency
Scalability
authentication
internet
Big Data
Metrics
Forensics
data acquisition
big data security in the cloud
cloud data
Android devices
tokens
biblio
A Cloud Data Storage Technology for Alliance Blockchain Technology
Submitted by grigby1 on Mon, 06/13/2022 - 3:37pm
Metrics
distributed
cloud storage security
cloud data
data storage
Memory
big data security in the cloud
Technological innovation
Resistance
Cloud Computing
smart contracts
Scalability
Conferences
Resiliency
resilience
pubcrawl
blockchain
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 1:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Lightweight Searchable Encryption Scheme Based on Certificateless Cryptosystem
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
keyword encryption
resilience
Resiliency
composability
pubcrawl
third-party manager
secret value
searchable encryption technology
searchable encryption schemes
searchable encryption
public key cryptography
partial private key
multiuser ciphertext retrieval
lightweight searchable encryption scheme
Lightweight
Cryptography
key escrow problem
identity-based cryptosystem
file index
digital signatures
data owner stores
cloud storage environments
cloud server
ciphertext data
certificateless encryption schemes
certificateless cryptosystem
certificate management problem
cloud storage
private key cryptography
cloud data
1
2
next ›
last »