Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data owners
biblio
A Hybrid Data Access Control Using AES and RSA for Ensuring Privacy in Electronic Healthcare Records
Submitted by grigby1 on Thu, 07/08/2021 - 2:37pm
Organizations
user privacy in the cloud
user privacy
Semi-Trusted Authority
Scalability
Rule Based Engine
Resiliency
resilience
Registers
public cloud
pubcrawl
outsourcing
Access Control
organization
Metrics
Engines
Designation
data privacy
data owners
Cloud Computing
cloud
Authorized Cloud
Audit request
Attributes
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
biblio
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
high communication
database service providers
Outsourced Database
Outsourced Database Integrity
business owners
data completeness protecting scheme
data confidentiality protection aspect
data correctness
data integrity protection aspect
database outsourcing
OPE encrypted
ORDER BY
order-preserving encryption
outsourced data secure
query completeness
range queries
widely used encryption scheme
composability
Servers
Cryptography
data owners
encryption
data privacy
data integrity
Resiliency
pubcrawl
Cloud Computing
Metrics
query processing
Databases
Probabilistic logic
database management systems
security protection
outsourcing
biblio
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
Submitted by aekwall on Mon, 10/19/2020 - 12:07pm
outsourcing
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
secured fine-grained selective access
outsourced cloud data
key-policy attribute-based encryption (KP-ABE)
fine-grain access control system
data users
cloud repositories
data management
IoT environments
fine-grained access control
smart contract
Cloud Computing
Data Transmission
blockchain
pubcrawl
Resiliency
Internet of Things
data privacy
Access Control
encryption
data owners
Cryptography
authorisation
Scalability
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 2:35pm
k-NN search schemes
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
authorized data users
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
Cryptography
nearest neighbor search
k-nearest neighbor search
search problems
data storage
security property
nearest neighbour methods
Measurement
Metrics
Security analysis
Cloud Computing
data privacy
Mathematical model
matrix algebra
pubcrawl
authorisation
biblio
Measuring data privacy preserving and machine learning
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
Organizations
Software
sensitive data
pubcrawl
Privacy-preserving
privacy violations
privacy preservation metric
Privacy Preferences
privacy models and measurement
privacy measurement
privacy levels
privacy
Computational modeling
Metrics
Measurement
machine learning techniques
machine learning models
machine learning
learning (artificial intelligence)
data publishing
data publisher
data privacy-preserving
data privacy
data owners
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
A blockchain-based data usage auditing architecture with enhanced privacy and availability
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
distributed infrastructures
untrusted servers
unauthorized users
tamper-proof evidences
security breaches
Resiliency
resilience
pubcrawl
Proposals
privacy-preserving fashion
Peer-to-peer computing
network accountability
Metrics
hierarchical identity based cryptographic mechanisms
auditable contracts
data usage compliance
data sharing
data privacy
data owners
data access
Cryptography
contracts
composability
blockchain-based data usage auditing architecture
blockchain infrastructures
authorization
authorisation
1
2
next ›
last »