Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Smart City Security Issues: Depicting Information Security Issues in the Role of an Urban Environment
Submitted by BrandonB on Tue, 05/05/2015 - 9:26am
big cities
Cities and towns
Cloud Computing
data privacy
information security
Intelligent sensors
privacy issues
security issues
security of data
Servers
smart cities
Smart City
smart city security
urban environment
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management
biblio
Secure Data Mining in Cloud Using Homomorphic Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
Big Data
Cloud Computing
Cryptography
data analysis
Data mining
data mining security
data privacy
Data storage systems
Databases
encryption
Homomorphic encryption
k-means data mining approach
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 2:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
« first
‹ previous
…
99
100
101
102
103
104
105
106
107
next ›
last »