Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
biblio
Identity access management for Multi-tier cloud infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 1:19pm
authentication
authorisation
authorization
centralized identity access management
Cloud Computing
computer architecture
green-thread process
IAM system
load balanced process
multitier cloud infrastructures
biblio
On the implementation of mceliece with CCA2 indeterminacy by SHA-3
Submitted by BrandonB on Wed, 05/06/2015 - 11:50am
McEliece algorithm
Vectors
SHA-3 module
SHA-3
secure hash algorithm
public-key
public key cryptography
post-quantum public-key algorithm
Post-quantum cryptography
Algorithm design and analysis
McEliece
Keccak
encryption
computer architecture
Clocks
CCA2 security standard
CCA2 indeterminacy
CCA2
biblio
Self-establishing a Service Level Agreement within autonomic cloud networking environment
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
contracts
SLA
Service Level Agreement
security
quality of service
QoS
NaaS services
IaaS services
CSP
autonomic cloud managers
computer architecture
cloud service user
cloud service provider
cloud computing research communities
Cloud Computing
Bandwidth
Availability
autonomic cloud networking environment
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
OSGI
telecommunication network management
software-defined networking
software radio
Software
security
SDN philosophy
SDN networks
SDN manager
SDN architecture
SDN
Protocols
programmable management framework
PDEE
autonomic network management
on-the-fly code update
network management
management functions
IP networks
Hardware
FIPA
evolved SDN
distributed execution environment
control systems
computer architecture
codes
code lifecycle management
bottom-up approach
biblio
Multiagent Web for the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 9:55am
language independent data formats
Web-scale multiagent Internet of Things
Web protocols
transport protocols
sensors
security
Protocols
network of networks
multiagent Web
multiagent architecture
multi-agent systems
Cloud Computing
JSON
Internet of Things
internet
HTTP
heterogeneous platforms
electronic data interchange
Databases
data management architecture
computer architecture
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 9:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
Secure Reliable Group Communication for Tactical Networks
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
norm
tactical networks
tactical communication
suite-b
secure group communication
SECRET
reliable group communication
Reliability
Protocols
NSA Suite B cryptography
authentication
multicast
military computing
military communication
group oriented communication
encryption
Cryptography
computer network security
computer network reliability
computer architecture
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Data mining
computer architecture
Buildings
architecture
information dissemination
information management
information sharing
processing architecture
secure systems
security
sensing infrastructure
sensor information flow
sensors
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
next ›
last »