Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Hierarchy Architecture Security Design for Energy Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Metrics
zero energy towns
social infrastructure
smart power grids
security of data
security facility
Scalability
Resiliency
renewable energy
pubcrawl
power system security
power engineering computing
Big Data
Internet of Things
ICT technology
hierarchy architecture security design
environmentally friendly new energy
energy technology
energy problems
energy field
Energy Cloud security
cloud concept
Cloud Computing
big data security in the cloud
biblio
User-Profile-Based Analytics for Detecting Cloud Security Breaches
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Anomaly Detection
big data security in the cloud
Cloud Computing
Cloud Security
machine learning
Market research
Measurement
Metrics
pubcrawl
Resiliency
Scalability
standards
Support vector machines
Virtual Machine Resource Usage
biblio
Attribute-Based Proxy Re-Encryption Method for Revocation in Cloud Data Storage
Submitted by grigby1 on Tue, 02/06/2018 - 1:46pm
Access Control
Attribute-Based Encryption (ABE)
big data security in the cloud
Cloud Computing
cloud storage
encryption
Metrics
Proxy re-encryption
pubcrawl
Resiliency
Scalability
Servers
Time measurement
biblio
Measures of Network Centricity for Edge Deployment of IoT Applications
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
big data security metrics
Buildings
Cloud Computing
Computational modeling
edge computing
Fog computing
IoT
Metrics
Monitoring
Network Centricity
Performance analysis
pubcrawl
Resiliency
Scalability
sensors
Servers
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
k-anonymity
Scalability
Resiliency
pubcrawl
private data
privacy models
privacy infringement
privacy guarantee rate
privacy enhancement
privacy assurance
privacy
Policy
Metrics
accurate data
Influenza
Human Factors
differential privacy
diff-anonym algorithm
data privacy
Data models
data anonymity
Computers
Cloud Computing
cloud
big data privacy
Big Data
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
« first
‹ previous
…
93
94
95
96
97
98
99
100
101
…
next ›
last »