Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Security Policy System for Cloud Computing Education Big Data: Test based on DDos Large-Scale Distributed Environment
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
Metrics
Web and internet services
Support vector machines
Security Policy System
security management
Scalability
Resiliency
resilience
pubcrawl
Internet-scale Computing Security
Large-Scale Distributed Environment
education
denial-of-service attack
DDoS
Cloud Computing Education
Cloud Computing
Blocklists
big data security in the cloud
biblio
Data Integrity Auditing Scheme for Preserving Security in Cloud based Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
cloud
medical data
auditing
Costs
Resiliency
integrity
big data security in the cloud
data integrity
simulation
Cloud Computing
Big Data
Medical services
data privacy
Scalability
resilience
Metrics
pubcrawl
biblio
Securing Big Data: A Survey on Security Solutions
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
encryption
Internet of Things
Cloud Computing
security
pubcrawl
Metrics
resilience
Scalability
Big Data
data analysis
IoT security
big data security in the cloud
Electrical Engineering
Resiliency
Big Data Analytics
biblio
Analysis of a Joint Data Security Architecture Integrating Artificial Intelligence and Cloud Computing in the Era of Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 11:16am
computer architecture
Cloud Computing
pubcrawl
Metrics
resilience
Scalability
Artificial Intelligence
Big Data
Data mining
Data Security
big data security in the cloud
Resiliency
application security
biblio
Achieving Privacy-preserving Data Sharing for Dual Clouds
Submitted by aekwall on Fri, 03/31/2023 - 9:39am
Cloud Computing
Medical services
data privacy
performance evaluation
encryption
pubcrawl
Metrics
Resiliency
composability
data sharing
Solids
social computing
dual server
searchable encryption
secure two-party computation
black box encryption
biblio
Hybrid Access Control for Atoring Large Data with Security
Submitted by aekwall on Fri, 03/31/2023 - 9:39am
Cloud Computing
data privacy
encryption
Access Control
cloud storage
pubcrawl
Metrics
Resiliency
composability
Costs
Memory
Closed box
CP-ABE Techniques
EDoS attacks
Encrypted Cloud Storage
black box encryption
biblio
BASDB: Blockchain assisted Secure Outsourced Database Search
Submitted by grigby1 on Fri, 03/17/2023 - 12:13pm
Industries
symmetric searchable encryption
cloud database
information sharing
relational database security
smart contract
Resistance
smart contracts
composability
Cloud Computing
Databases
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
relational databases
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
MPTCP-based Security Schema in Fog Computing
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
Fog computing
security
Cloud Computing
Computational modeling
Fog-Computing Security
IoT security
Linux
man-in-the-middle attack
Multipath-TCP
performance evaluation
pubcrawl
resilience
Resiliency
resource management
software defined network security
Technological innovation
biblio
A Secure Workflow for Shared HPC Systems
Submitted by grigby1 on Fri, 03/03/2023 - 12:15pm
Cloud Computing
security
pubcrawl
Human Factors
Metrics
resilience
Resiliency
sensitive data
Virtualization
Reliability
Compositionality
operating systems
High performance computing
iOS Security
Secure computing
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »