Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensitive data outsourcing
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index