Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud servers
biblio
Towards Autonomic Entropy Based Approach for DDoS Attack Detection and Mitigation Using Software Defined Networking
Submitted by grigby1 on Tue, 01/25/2022 - 4:50pm
Linux
Traffic
mechatronics
data plane
cloud servers
Autonomic Security
control plane
denial-of-service attack
DDoS Attack
computer architecture
SDN
Law
composability
Entropy
Resiliency
resilience
pubcrawl
Servers
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption