Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
A Blockchain Framework for Ensuring Data Quality in Multi-Organizational Clinical Trials
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
multi-site trial management
activity-specific private channels
channel-specific smart contracts
clinical trial
data management infrastructure
high-throughput transactions
human subject protection
Institutional Review Board amendments
IRB
data quality
multiorganizational clinical trials
multiple organizations
multisite clinical trials
outsourcing trial management
pharmaceutical companies
pharmaceutical industry
site monitoring
distributed ledger
Resiliency
pubcrawl
composability
Metrics
blockchain
organisational aspects
cryptocurrencies
Distributed databases
data privacy
medical information systems
outsourcing
contracts
smart contract
Outsourced Database Integrity
permissioned blockchain
blockchain network
biblio
EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database outsourcing
token enforced cloud storage
search results provability
Query Auditing
outsourcing computation
Invertible Bloom Filter
Integrity Auditing
information proprietor
efficient auditing for outsourced database
EAODBT
database privacy
database encryption
database administration
cloud service provider
Outsourced Database Integrity
security of data
outsourcing
storage management
security issues
database management systems
Reliability
Databases
Metrics
composability
pubcrawl
Resiliency
security
data privacy
IP networks
Cloud Computing
biblio
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
high communication
database service providers
Outsourced Database
Outsourced Database Integrity
business owners
data completeness protecting scheme
data confidentiality protection aspect
data correctness
data integrity protection aspect
database outsourcing
OPE encrypted
ORDER BY
order-preserving encryption
outsourced data secure
query completeness
range queries
widely used encryption scheme
composability
Servers
Cryptography
data owners
encryption
data privacy
data integrity
Resiliency
pubcrawl
Cloud Computing
Metrics
query processing
Databases
Probabilistic logic
database management systems
security protection
outsourcing
biblio
Completeness Integrity Protection for Outsourced Databases Using Semantic Fake Data
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database management systems
semantic fake data
range query
outsourced databases
Order Preserving Encryption
data integrity problem
data completeness
CPDB
Completeness Protected Database
completeness integrity protection
Outsourced Database Integrity
Outsourced Database
outsourcing
Semantics
Cloud Computing
Data protection
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
data integrity
data privacy
cloud storage
encryption
Cryptography
Servers
biblio
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
active IC transactions
distributed ledger
ICs
integrated circuit design
Watermarking
electronic engineering computing
blockchain protocol
IP piracy
split manufacturing
blockchain technology
advanced technologies
BLIC protocol
composite consensus protocol
deleterious design modification
huge paradigm shift
IC supply chains
passive IC transactions
blockchain
data privacy
Hardware
Protocols
Resiliency
pubcrawl
composability
policy-based governance
Peer-to-peer computing
Cryptography
Computer crime
supply chain management
supply chains
manufacturing
cryptocurrencies
smart contracts
integrated circuits
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 2:12pm
resilience
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
lower inference accuracy
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
deep neural network applications
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
abusive data collection
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »