Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
information technology
The New York Times
Service Hijacking
Servers
security of data
Security Incident Management
pubcrawl170109
Organizations
malicious cyber activity
Account Hijacking
cyber-attack
Computer crime
Cloud Security
cloud environment
Cloud Computing
account hijacking prevention
account hijacking analysis
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
global flow diagram
Virtual machining
unauthorized access risks
unauthorized access
security of data
pubcrawl170108
pubcrawl170107
multilevel hybrid cloud algorithm
legitimacy detection
graph theory
global flow graph
Access Control
Frequency modulation
formal representation
detection algorithms
detection algorithm
Decision Making
data access
Cloud Computing
Algorithm design and analysis
access violation
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
"Approach to Enhancing Concurrent and Self-Reliant Access to Cloud Database: A Review"
Submitted by grigby1 on Thu, 02/23/2017 - 12:54pm
encryption algorithm
storage management
Servers
self-reliant access
security
pubcrawl170105
Protected Database-as-a-Service
power station
multiple geographically distributed clients
multiple business
metadata storage
metadata
meta data
Master key
Advance Encryption Standard
encryption
Distributed databases
database-as-a-service
database management
database installation
customer services
Cryptography
confidentiality
concurrent access
concurrency (computers)
commerce
cloud database
Cloud Computing
biblio
"Honeypot based unauthorized data access detection in MapReduce systems"
Submitted by grigby1 on Thu, 02/23/2017 - 12:49pm
data processing capabilities
unauthorized data access detection
pubcrawl
privacy
parallel processing
on-demand scalability
MapReduce systems
honeypot
homomorphic encryption methods
general programming languages
Distributed databases
Big Data
data privacy
Data models
data encryption
data analytics tasks
data analysis
Cryptography
pubcrawl170105
Computational modeling
Cloud Computing
Big Data revolution
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 12:47pm
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"Semantic-Based Searchable Encryption in Cloud: Issues and Challenges"
Submitted by grigby1 on Thu, 02/23/2017 - 12:43pm
Cloud Computing
Cryptography
data privacy
encryption
Indexes
pubcrawl170105
information security
information security technique
privacy-preserving issue
pubcrawl
searchable encryption
semantic search
semantic-based searchable encryption
Semantics
Servers
biblio
"Auditing Protocols for Cloud Storage: A Survey"
Submitted by grigby1 on Thu, 02/23/2017 - 12:41pm
auditing protocol
Cloud Computing
cloud storage
Computational modeling
Data models
data privacy
information science
integrity
outsourcing
protocol auditing
Protocols
pubcrawl170105
Scalability
Secure
security
« first
‹ previous
…
106
107
108
109
110
111
112
113
114
…
next ›
last »