Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks
Submitted by aekwall on Mon, 03/29/2021 - 11:57am
Predictive Metrics
Generative Adversarial Learning
Privacy-preserving Learning
learning latent representations
learned representations
information maximizing differentially private generative adversarial network
imdpGAN
end to end framework
personally identifiable information
binary classification
face recognition
privacy protection
private data
Scalability
differential privacy
deep learning
generative adversarial networks
Generators
Training
Data protection
pattern classification
neural nets
privacy
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
Highly Parallel Seedless Random Number Generation from Arbitrary Thread Schedule Reconstruction
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
computerized data
random key generation
unlimited parallelism
universal concern
uniform probability outcomes
trng
threading
revenue source
reconstruction algorithm
random source
random number generator
multiprocessor
highly parallel seedless random number generation
ENT
DieHarder
data sets
Scalability
compare-and-swap operations
Blum-Elias algorithm
arbitrary thread schedule reconstruction
PRNG
Random sequences
encryption keys
private data
random number generation
probability
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
evaluator policy
Private Function Evaluation
private data
privacy policy enforcement
Privacy Policies
Policy Oblivious Encryption
personalized medication
outsourcing
outsourced private function evaluation
OPFE-PPE
hospitals
Homomorphic encryption
Genetics
genetic epidemiology
Cloud Computing
drugs
data contributor
client policy
attribute-based encryption
privacy
pubcrawl
Human behavior
machine learning
learning (artificial intelligence)
data privacy
encryption
Cryptography
Scalability
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
1
2
next ›
last »