Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
identity abuses
information privacy
interest protection
internet
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
Banking
Cloud Computing
cloud services acquisition
Ghana
Context
service provider ability
service provider integrity
transacting parties
trust
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Data protection
digital identity management system
financial institutions
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Identity access management for Multi-tier cloud infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 1:19pm
authentication
authorisation
authorization
centralized identity access management
Cloud Computing
computer architecture
green-thread process
IAM system
load balanced process
multitier cloud infrastructures
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Harnessing the Cloud for Teaching Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 10:55am
cloud
Cloud Computing
computer security
Cybersecurity
long distance education
network security
security
biblio
A Method of Evaluation for Insider Threat
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
pubcrawl
Analytical models
Cloud Computing
Computer crime
Computers
cyber security
Educational institutions
insider threat
insider threat analysis
insider threat evaluation
insider threat mitigation
Organizations
security of data
System Dynamic
vulnerability scanner
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by BrandonB on Wed, 05/06/2015 - 10:30am
factorial space
UDP-flood DDoS attacks
transport protocols
system-based detection
system metrics
source-based detection
principal component analysis
Monitoring
Measurement
malicious use
legitimate usage
legitimate activity
Intrusion Detection
botcloud activity
distributed system behavior analysis
distributed processing
distributed massive attacks
computer network security
Computer crime
collaboration
cloud service provider
Cloud Computing
botnets
botcoud behavior
botcloud detection
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 10:26am
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
biblio
Self-establishing a Service Level Agreement within autonomic cloud networking environment
Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
contracts
SLA
Service Level Agreement
security
quality of service
QoS
NaaS services
IaaS services
CSP
autonomic cloud managers
computer architecture
cloud service user
cloud service provider
cloud computing research communities
Cloud Computing
Bandwidth
Availability
autonomic cloud networking environment
« first
‹ previous
…
110
111
112
113
114
115
116
117
118
…
next ›
last »