Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Thu, 04/30/2015 - 2:34pm
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
A trusted measurement scheme suitable for the clients in the trusted network
Submitted by BrandonB on Thu, 04/30/2015 - 2:21pm
network security threat
trusted network connection
trusted network
trusted measurement scheme
trusted computing field
Trusted Computing
trust measurement scheme
static measurement
state measurement
real-time systems
real-time state measurement
real-time measurement support
real-time measurement
polynomials
access control technology
message authentication
identity privacy
Gold
fine-grained states
fine-grained security policy
fine granularity
dynamic measurement
data privacy
Complexity theory
authorisation
authentication mechanism
authentication
Area measurement
biblio
Proposal of a secure, deployable and transparent middleware for Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
Internet of Things
Zigbee
Transparent Middleware
TLS
smart objects
security of data
security architecture
security
secure middleware
protection measures
OAuth
middleware
IoT transparent middleware
AES
electronic data interchange
deployable middleware
data privacy
data integrity
data exchange service privacy
data exchange service integrity
data exchange service confidentiality
data exchange service authenticity
computer architecture
authorization
authentication
biblio
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
Submitted by BrandonB on Thu, 04/30/2015 - 2:12pm
privacy preserving hybrid storage
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine storage
solid state disk
service infrastructure
Servers
security
privacy preserving shared storage system
Cloud Computing
large-scale cloud data center
Indexes
I/O latency performance improvement
hybrid VM storage
HVSTO
distributed structure
distributed storage
data privacy
Conferences
computer centres
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 1:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
file
Cyber Physical Systems in Highway Transportation
Submitted by massey on Fri, 11/07/2014 - 2:53pm. Contributor:
Dan Massey
CPS Domains
Automotive
Avionics
Modeling
Transportation
Education
Foundations
DHS
R&D in CPS
mobile devices
data privacy
National CPS PI Meeting 2014
2014
Session 11
Presentation
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
file
A Framework for the Impact Analysis of Data Quality/Integrity/Privacy in Cyber-Physical Electric Energy System
Submitted by cdh8954 on Fri, 05/16/2014 - 5:25pm. Contributors:
Le Xie
Dae-Hyun Choi
CPS Domains
Energy
CPS Technologies
Foundations
Cyber-physical electric energy system
data integrity
data privacy
data quality
Texas A&M University
2014 CPS-ECP
2014
Academia
Poster
Poster Submissions
Posters
« first
‹ previous
…
99
100
101
102
103
104
105
106
107
next ›
last »