Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attribute encryption
biblio
Security Access Assurance Related Technologies Survey
Submitted by grigby1 on Fri, 05/19/2023 - 2:07pm
Europe
security access assurance
hierarchical identity encryption
Dispatching
attribute encryption
computer network reliability
CP-ABE
Communication Systems
smart power grid
pubcrawl
power grids
Power Grid
Elliptic curve cryptography
computer science
Scalability
collaboration
policy-based governance
biblio
An Attribute Revocable CP-ABE Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Cloud Computing
Subset Cover
storage management
Scalability
RCP-ABE scheme
pubcrawl
policy-based governance
fine-grained attributes
Cryptography
CP-ABE
collaboration
cloud storage environment
Access Control
ciphertext storage
ciphertext sharing
ciphertext policy
ciphertext access control
Big Data
authorisation
attribute revocation
attribute revocable CP-ABE scheme
attribute encryption scheme CP-ABE
attribute encryption
biblio
An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
attribute encryption
cloud
Cloud Computing
cloud proxy server
data storage
encryption audits
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
Scalability
trusted authority
user privacy
user privacy in the cloud
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption