Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
Human Factors
Task Analysis
Scalability
pubcrawl
psychology
privacy
Neurotechnology
neuroscience
IoT
Artificial Intelligence
expert systems
electroencephalography
eeg
data privacy
Data models
cognitive privacy
Brain modeling
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
Transparent Provable Data Possession Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
encryption
user convenience
transparent provable Data Possession scheme
transparent PDP
third-party auditor
security of data
security
pubcrawl
provable data possession
Probabilistic logic
metadata
Mathematical model
general cloud storage system model
file organisation
encryption audits
provable security
discrete logarithm problem
data security techniques
data privacy
data integrity
conventional PDP
cloud storage
cloud proof
Cloud Computing
auditing
audit
Compositionality
Predictive Metrics
Resiliency
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »