Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file system
biblio
OUTFS+. An Efficient User-Side Encrypted File System Using IBE With Parallel Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 12:47pm
operating systems
Parallel Encryption
file system
efficient encryption
outsourcing
cloud storage
identity based encryption
File systems
Market research
information retrieval
Cloud Computing
Libraries
composability
Cryptography
Software
Resiliency
resilience
pubcrawl
security
biblio
MicroBlind: Flexible and Secure File System Middleware for Application Sandboxes
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
Cloud Computing
collaboration
security
Peer-to-peer computing
pubcrawl
composability
malware
Virtual machining
Virtualization
File systems
sandboxing
information sharing
policy governance
file system
biblio
Towards Embedding Data Provenance in Files
Submitted by aekwall on Fri, 02/25/2022 - 10:46am
Forensics
usability
Self-contained Provenance
file system
End-to-end Data Provenance
Embedded Data Provenance
Delta-encoding
data provenance
Stakeholders
Provenance
Intrusion Detection
Prototypes
History
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 12:18pm
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
dynamic analysis approach
virtual machine
virtual machines
machine-learning-based approaches
file system
Virtual machine monitors
cloud nodes
deep learning technology
deep-learning-based memory analysis
Predictive Metrics
malicious binary files
malware execution
Memory Analysis
memory analysis approach
real-world malwares
run-time overhead
zero-day malware
Monitoring
Gray-scale
Malware Analysis
Virtual machining
privacy
Metrics
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
invasive software
malware detection
malware
Cloud Computing
biblio
File I/O Performance Analysis of ZFS BTRFS over iSCSI on a Storage Pool of Flash Drives
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
Linux
BTRFS
compute-intensive systems
file I/O performance
file system
filesystem
flash drives
highly functioning storage systems
iSCSI
block device
NAS storage
open-source filesystem ZFS
storage hardware
storage pool
subvolume
ZFS
BIOS Security
Metrics
Cloud Computing
Scalability
Conferences
Bandwidth
tools
Hardware
storage management
pubcrawl
security
Resiliency
resilience
public domain software
Human Factors
performance evaluation
data management
backup storage
biblio
ChainFS: Blockchain-Secured Cloud Storage
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
forking attacks
trusted Blockchain
storage management
Servers
security of data
Resiliency
resilience
Public key
pubcrawl
policy-based governance
middleware system
middleware security
middleware
History
Fuses
Amazon S3 cloud storage
fork consistency
file-system interface
file system
file operation logging
composability
cloud-storage security
cloud storage services
cloud storage
Cloud Security
Cloud Computing
ChainFS middleware
ChainFS data file storage
blockchain-secured cloud storage
blockchain
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Hiding the Long Latency of Persist Barriers Using Speculative Execution
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
resilience
nonvolatile memory technology
NVMM
pcommit
performance bottleneck
performance overhead
persist barriers
persistence instructions
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
Random access memory
random-access storage
Nonvolatile memory
Resiliency
Safe Coding
Safety
significant execution time overhead
Software
speculative execution
Speculative Persistence
speculative persistence architecture
storage management
substantial performance boost
volatile caches
fail-safe code
checkpoint-based processing
checkpointing
clflushopt
clwb
collaboration
common data structures
consistent state
data structures
DRAM
DRAM chips
expensive fence operations
cache storage
Failure Safety
file system
Force
Human Factors
logging based transactions
long latency persistency operations
Metrics
modern systems reorder memory operations
non-volatile main memory
nonpersistent implementations
NonVolatile Main Memory