Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
AccAuth: Accounting system for OAuth protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
Context
user-centric accounting model
three-party communication protocol
third party application
standards
service provider
Servers
resource usage monitor
Protocols
protected resource access
OAuth protocol
delegation
AccAuth
computer architecture
Cloud Computing
authorized usage
authorized resource usage
authorization
authorisation
authentication
accounting protocols
accounting process
accounting layer
accounting
biblio
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Submitted by BrandonB on Tue, 05/05/2015 - 8:45am
federated identity management systems
Virtual machining
sticky session mechanism
Shibboleth architecture
Servers
Scalability
Proposals
multitenant authorization
federated identity system scalability
authentication
Cryptographic Protocols
Cloud Computing
cloud based environments
central authentication service
central authentication protocols
CAS
authorisation
biblio
Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 8:40am
on-demand multiprovider multidomain heterogeneous cloud infrastructure services
heterogeneous multiprovider multicloud environment
ICAF
ICFF
integration issue
intercloud architecture framework
intercloud federation framework
intercloud federation scenarios
interoperability issue
heterogeneous multiprovider intercloud environment
operating systems (computers)
outsourcing
provider-side federation
resource brokering
resource outsourcing
Software Architecture
Trusted Computing
trusted third party entities
customer-side federation
authorisation
authorisation infrastructure
authorization
cloud based services
Cloud Computing
cloud service broker
CSB
customer campus
architecture patterns
distributed federated multidomain authentication
dynamic trust relations
enterprise infrastructure
federated access control model
federated identity management model
federated identity management scenarios
FIDM model
heterogeneous intercloud environment
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 2:53pm
directory services
virtual shared servers
user authorization
token management system
token granting
Servers
security as a service
mutual authentication
internet
Educational institutions
Access Control
Databases
data correctness
Computers
cloud service
Cloud Computing
authorisation
authentication
access rights
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
« first
‹ previous
…
113
114
115
116
117
118
119
120
121
…
next ›
last »