Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Cybersecurity and Data Privacy in the Cloudlet for Preliminary Healthcare Big Data Analytics
Submitted by grigby1 on Tue, 04/27/2021 - 2:46pm
Industries
wireless body area network
wireless biosensor network
security
pubcrawl
Mobile handsets
mobile edge cloud
Medical services
medical big data analytics
Big Data
data privacy
cybersecurity and data privacy
computer security
cloudlet
Cloud Computing
cloud
big data security in the cloud
biblio
Metrics to Meet Security Privacy Requirements with Agile Software Development Methods in a Regulated Environment
Submitted by grigby1 on Tue, 04/27/2021 - 2:40pm
real-time and embedded systems
US Department of Defense
tools
Software measurement
Software
security
Scalability
Resiliency
resilience
Agile software development
pubcrawl
Metrics
Iterative methods
Design tools and techniques
data privacy
Communication system security
Big Data
biblio
CIED - rapid composability of rack scale resources using Capability Inference Engine across Datacenters
Submitted by aekwall on Tue, 04/27/2021 - 1:14pm
Servers
Hardware
security
pubcrawl
temperature
data privacy
Production facilities
composability
converged infrastructure
datacenter
Datacenter automation
Wiring
biblio
Blockchain-Based Secure Collaboration Platform for Sharing and Accessing Scientific Research Data
Submitted by grigby1 on Tue, 04/27/2021 - 12:31pm
Human behavior
smart contracts
Secure File Sharing
Resiliency
resilience
pubcrawl
Permission
Metrics
Hyperledger Fabric
Access Control
data privacy
data management
Cryptography
composability
collaboration
blockchain
attribute-based encryption
biblio
Data Sharing Attribute-Based Secure with Efficient Revocation in Cloud Computing
Submitted by grigby1 on Tue, 04/27/2021 - 12:30pm
Human behavior
Security analysis
Secure File Sharing
Resiliency
resilience
pubcrawl
process control
Metrics
information technology
authorization
encryption
Efficient revocation
data privacy
Data encryption key
computer science
composability
Cloud Computing
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
Receivers
man-in-the-middle attack
man-in-the-middle attacks
Metrics
personal data disclosure
personally identifiable information
PII
policy-based governance
privacy
pubcrawl
Python
Information Assurance
reputation
resilience
Resiliency
Scalability
Self-Sovereign Identity
self-sovereign identity agents
Sensitivity
user autonomy
user immutability
Data disclosure
attribute sensitivity score model
authorisation
blockchain
blockchains
collaboration
composability
confidence level
credential exchange
credential exchanges
attribute sensitivity
data privacy
distributed ledger
Engines
Human behavior
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
biblio
On the Information Leakage in Private Information Retrieval Systems
Submitted by grigby1 on Thu, 04/08/2021 - 5:10pm
chaotic communication
total leakage
private information retrieval systems
PIR systems
individual message leakage
common randomness
coding schemes
information forensics
Information Leakage
encryption
information retrieval
security
privacy
Scalability
data privacy
Indexes
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
collaborative security
sensitive information
information exchange
security-related information
privacy loss
game-theoretic analysis
information theoretic security
collaboration gain
collaborative entities
Loss measurement
collaborative security schemes
information sharing process
multiple security entities
Quantitative information flow
quantitative information flow game perspective
quantitative information flow games
security-privacy tradeoff
security of data
security decisions
Games
collaboration
Intrusion Detection
cyber-attacks
Metrics
privacy
policy-based governance
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »