Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
Ecosystems
Resiliency
resilience
pubcrawl
multifactor authentication
Metrics
IT industry
hybrid cryptographic system
Human Factors
human factor
Human behavior
HCS
encryption
authentication
Data Security
data privacy
CSP
Cryptography
CloudSim simulator
CloudSim
cloud service providers
cloud security ecosystem
Cloud Security
Cloud Computing
cloud adoption
biblio
A multifactor authentication system using secret splitting in the perspective of Cloud of Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
message authentication
virtualized control
smart cards
Servers
Security analysis
secret splitting
Resiliency
resilience
pubcrawl
multifactor authentication system
multifactor authentication
Metrics
authentication
IoT
Internet of Things
Human Factors
human factor
Human behavior
encryption algorithms
Diffie-Hellman key exchange algorithm
Cryptography
CoT
Cloud of Things
Cloud Computing
biblio
A Scalable and Privacy-Aware IoT Service for Live Video Analytics
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
Metrics
user privacy in the cloud
User behavior
Scalability
Resiliency
resilience
pubcrawl
privacy protection
Privacy Mediator
privacy
AI
Human Factors
human factor
Human behavior
face recognition
edge computing
cloudlet
Cloud Computing
Artificial Intelligence
biblio
Chaotic Searchable Encryption for Mobile Cloud Storage
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
chaos
cloud
Cloud Computing
composability
encryption
Keyword search
locality sensitive hashing
Mobile communication
pubcrawl
Resiliency
searchable encryption
security
biblio
Flexible Wildcard Searchable Encryption System
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
authorization
Cloud Computing
composability
encryption
Keyword search
metadata
multiple users
pubcrawl
Public key
Resiliency
searchable encryption
Top-k
user revocation
wildcard search
biblio
Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
Cloud Computing
cloud storage
composability
encryption
Indexes
Keyword search
phrase search
pubcrawl
ranked search
Resiliency
searchable encryption
Servers
symmetric searchable encryption
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
Testbed for security orchestration in a network function virtualization environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
normal network traffic
virtualisation
virtual reality
testbed implementation
telecommunication traffic
telecommunication security
targeted attacks
security orchestration
security of data
Scalability
responses
Resiliency
quality of service
pubcrawl
orchestrate virtualized network functions
machine learning
network quality of service
network function virtualization environment
network function virtualization
Metrics
learning (artificial intelligence)
intelligent response
Human behavior
DDoS
Conferences
computer network security
Computer crime
Cloud Computing
artificial intelligence security
adverse network conditions
« first
‹ previous
…
91
92
93
94
95
96
97
98
99
…
next ›
last »