Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
data privacy
test-bed experiments
security
Scientific Computing Security
rule management
Resiliency
pubcrawl
Protocols
multicloud environment
Metrics
Elliptic curve cryptography
data-intensive scientific collaborations
advanced mission delivery networks
Cryptographic Protocols
Compositionality
collaborative networks
collaborative network
collaboration
Cloud Computing
CL-RP
CertificateLess cryptography-based rule management protocol
CertificateLess cryptography
authenticated rule registrations
AMDN design
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
image encryption
Servers
server
Scientific Computing Security
Resiliency
public key cryptosystem
public key cryptography
pubcrawl
photography
NTRU
multiagent system
Metrics
Image quality
aerial photography
image capture
Homomorphic encryption
encryption
drones
Drone
concatenation
Compositionality
Cloud Computing
cloud
Amazon EC2 cloud server
aerial photography security
biblio
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
industrial networking
storage management
solar power
solar energy source
security of data
Scientific Computing Security
Resiliency
pubcrawl
optical prisms
optical communication
Metrics
Memory
low-cost resources
light-fidelity
Li-Fi
Cloud Computing
industrial network
green protection
Green products
green data storage environment
Green data storage
green data center
green cloud computing
data center
cybersecurity issues
cybersecurity analysis
computer security
Compositionality
Complexity theory
biblio
Policy enforcement for big data security
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
Metrics
security of data
security
Scientific Computing Security
Resiliency
pubcrawl
Privacy Policy
privacy
policy enforcement
Policy
Big Data
large-scale data storage
data privacy
data analysis
Compositionality
Cloud Computing
Business
big data security
big data privacy
Big Data handling
biblio
NSF GENI cloud enabled architecture for distributed scientific computing
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
research institute
networking traffic
North Carolina
NSF GENI cloud enabled architecture
Open Resource Control Architecture
operating systems
ORCA based GENI rack
parallel processing
provisioned L2 network domain
pubcrawl
Renaissance Computing Institute
RENCI
networking systems
Resiliency
Scientific Computing Security
scientific information systems
SDN controllers
Servers
software defined networking
software defined networking controllers
United States
virtual laboratory
virtual machines
Global Environment-for-Network Innovations
Cloud Computing
cloud federation
cloud resources
Compositionality
computer architecture
data transfer
distributed resource orchestration system
distributed scientific computing
distributed systems
Fabrics
GENI resources
baremetals
graphical user interfaces
Hardware
high-performance computing
high-throughput computing
HPC
HTC
Internet2 L2 service
L2 network domain
Metrics
National Science Foundation funded program
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
« first
‹ previous
…
100
101
102
103
104
105
106
107
108
…
next ›
last »