Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
bench4gis: Benchmarking Privacy-aware Geocoding with Open Big Data
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
Big Data Applications
big data privacy
viable geocoding strategies
surrogate data
privacy-aware geocoding solutions
patient privacy laws
open big data sets
Law
institutional regulations
healthcare data
Geospatial analysis
geographic information systems
geographic data
geographic coordinates
external transmission
Scalability
bench4gis
organization
Open Source Software
sensitive data
Benchmark testing
Human Factors
quality assurance
Metrics
pubcrawl
Resiliency
Medical services
privacy concerns
data privacy
Big Data
biblio
An Internet Medical Care-Oriented Service Security Open Platform
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
convenient online services
Autonomic Security
Visualized Control
standardized connection process
Service
Security Open Platform
personal privacy data security
medical data illegal stealing
Internet medical care-oriented service security open platform
Internet hospitals
Internet Hospital
data access process
security of data
Data Security
malicious attacks
medical information systems
health care
internet
composability
pubcrawl
Resiliency
data privacy
Big Data
biblio
Using Attribute-Based Encryption on IoT Devices with instant Key Revocation
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
sensor readings
sensor devices
resource constraint devices
Identity-based encryption
cryptographic cipher-texts
ABE cipher-texts
IoT services
Ciphers
Data protection
policy-based governance
Scalability
Human behavior
data encryption
IoT devices
Internet of Things
Conferences
attribute-based encryption
data privacy
encryption
Cryptography
authorisation
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
Cascading Machine Learning to Attack Bitcoin Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
decentralized cryptocurrency
Resiliency
resilience
pubcrawl
pattern classification
multiclass classification performance
Metrics
learning (artificial intelligence)
Human behavior
graph model
entities classification
electronic money
digital assets
anonymity
data privacy
Cryptography
composability
cascading machine
cascading classifiers
blockchain
Bitcoin network
bitcoin entity characterization
bitcoin blockchain data
bitcoin anonymity
Bitcoin analysis
« first
‹ previous
…
44
45
46
47
48
49
50
51
52
…
next ›
last »