Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
edge devices
Computing Theory and Privacy
sample data models
privacy architecture
practical data model
Message Queuing Telemetry Transport
fog-to-cloud computing systems
fog architecture
DPPforF2C
data service model
Data Privacy for Fog-to-Cloud (DPPforF2C)
data portfolio
data management portfolio
Advanced Message Queuing Protocol
telemetry
queueing theory
IoT
fog nodes
data management
Data models
Fog computing
Data Transmission
middleware
Protocols
pubcrawl
Human behavior
Resiliency
Internet of Things
privacy concerns
data privacy
Scalability
Cloud Computing
biblio
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:56am
ring signature
Computing Theory and Privacy
wearable smart sensing devices
user identifier
stealth address
smart sensing area
smart sensing
privacy-user-friendly scheme
personal data privacy
Intelligent sensors
blockchain based scheme
wearable computers
user experience
Scalability
privacy protection
sensors
human computer interaction
Public key
service providers
blockchain
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
differential privacy
Computing Theory and Privacy
user preferences
parameter epsilon
mechanism design
epsilon voting
differentially private system
parameter selection
Aggregates
Statistics
Scalability
game theory
Companies
standards
Computational modeling
privacy
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
Public key
Computing Theory and Privacy
Proxy Re Encryption
nonnegligible privacy issues
medical documents
identity based encryption
Health Information Systems
fuzzy conditional identity-based proxy re-encryption
FCI-PRE
electronic medical records
data-intensive domain
cloud-based health information system
healthcare providers
health care
Cloud Computing
fuzzy set theory
privacy
pubcrawl
Human behavior
Resiliency
Medical services
electronic health records
data privacy
Access Control
encryption
Cryptography
Scalability
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
Incentive mechanism
Computing Theory and Privacy
user payoff
user collaboration incentive mechanism
trajectory privacy
Repeated game
rational users
game analysis
CTPP
continuous query users
collaborative user behaviour
collaborative trajectory privacy preservation
location based services
LBS
Scalability
Trajectory
user privacy
Games
collaboration
Analytical models
query processing
privacy
pubcrawl
Human behavior
Resiliency
game theory
data privacy
Servers
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
privacy protection
Computing Theory and Privacy
social behavior network
privacy driven model
privacy disclosure behavior
networked human society
network evolutions
highly dynamical network behaviors
Habitual privacy
driving force
decision process
privacy awareness
behavioural sciences computing
Social Behavior
Sensitivity
Scalability
information theory
complex networks
social network
social networking (online)
Computational modeling
Social network services
privacy
pubcrawl
Human behavior
Resiliency
security
Conferences
data privacy
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
ubiquitous computing
Computing Theory and Privacy
user data privacy preservation
three-antithetic-party game
serious privacy issues
privacy-preserving data collection scheme
privacy leakage risk
data collection game
context-awareness
Context-aware services
context-aware applications
smart devices
game model
security of data
Numerical models
Games
Data collection
privacy
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
medical information systems
off-chain edge nodes
hyperledger composer fabric blockchain
hybrid blockchain-edge architecture
hybrid architecture
global electronic health record market
EHR privacy
EHR data management
blockchain-based controller
blockchain-based access control logs
access control policies
Access Control List
distributed ledger
transaction processing
Fabrics
edge computing
Scalability
health care
blockchain security
hyperledger
smart contracts
Distributed databases
smart contract
blockchain
pubcrawl
Resiliency
computer architecture
Medical services
data privacy
Access Control
authorisation
attribute-based access control
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »