Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Self-learning method for DDoS detection model in cloud computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
Heuristic algorithms
self-learning method
self-learning
Resiliency
relearning pool
relearning
pubcrawl
Netflow protocol
minimisation
Metrics
machine learning
legitimate user possibility reduction
learning (artificial intelligence)
Human behavior
Adaptation models
false detection minimization
distributed denial-of-service attack
DDoS detection model
DDoS attack detection
Data mining
computer network security
Computer crime
Computational modeling
composability
cloud virtual networks
Cloud Computing
Classification algorithms
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
biblio
Secure Tera-scale Data Crunching with a Small TCB
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Outsourced Database Integrity
virtual storage
virtual memory
trusted hardware
trusted computing base
Trusted Computing
tera-scale data crunching
self-contained services
security of data
secure virtual memory
secure execution
Resiliency
pubcrawl
Cloud Computing
Metrics
Memory management
Libraries
LASTGT system
large-scale data
large state on a generic trusted component
Intel SGX
hypervisor
Hardware
data handling
Cryptography
composability
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
biblio
Trust in Cloud Computing: Conceptual Typology and Trust-Building Antecedents
Submitted by grigby1 on Tue, 01/16/2018 - 6:16pm
Cloud Computing
composability
conceptual
it artifact
it outsourcing
Metrics
Outsourced Database Integrity
pubcrawl
Resiliency
trust
« first
‹ previous
…
96
97
98
99
100
101
102
103
104
…
next ›
last »