Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
Framework modeling for User privacy in cloud computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
privacy framework
user privacy in the cloud
user privacy framework
Trusted Computing
trust issues
security in cloud computing
Scalability
Resiliency
pubcrawl
protection monitor
privacy issues over cloud
Access Control
privacy
Organizations
Metrics
framework modeling
encryption
Data Security
data privacy
Cryptography
Cloud Computing
authorisation
biblio
Hadoop-based Dark Web Threat Intelligence Analysis Framework
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Hadoop
Tor
threat intelligence information
threat intelligence
pubcrawl
network services
internet
Human Factors
Human behavior
HBase-based distributed database
Hadoop-based dark web threat intelligence analysis framework
anonymous messaging
Distributed databases
data privacy
data handling
dark-net threat intelligence
dark web
dark network research
dark network criminal networks
crime messages
anonymous user communication
anonymous TOR tool
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
privacy
social networking (online)
Servers
self destructing data
security risks
security of data
security
Scalability
risk management
pubcrawl
privacy violations
privacy settings
privacy risks
Cryptography
OSN user
OSN server
OSN providers
online social networks
online social network users
internet
file servers
Facebook
delays
data privacy
data deletion
biblio
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
path-based dissimilarity function
Walk2Privacy mechanism
Walk2Privacy algorithm
Task Analysis
Target link privacy preserving
target link privacy disclosure
Switches
submodularity property
social networking (online)
self-avoiding random walk
scale social graphs
Scalability
pubcrawl
privacy
adversarial link prediction
monotonicity property
Link prediction
Link deletion.
Indexes
greedy link deletion
Graph utility
graph theory
GLD2Privacy mechanism
data privacy
data deletion
Computational modeling
Big Data
biblio
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
Hybrid Blockchain
XOR Global State(XGS)
XOR global state
system trust
smart contracts
Servers
Scalability
Public key
pubcrawl
private key cryptography
privacy breach
privacy
owner private key
modification
metadata
hybrid blockchain-based XGS
append-only distributed ledger
Distributed databases
Distributed Database
deletion
database technology
data privacy
data deletion
create-retrieve-append-burn
CRAB method
contents modification
contents deletion
blockchain
block-chained hybrid blockchain system
authentication
arbitrary modifications
arbitrary injection
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 1:58pm
Security Properties
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
hardware-assisted transparent enclave
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
data confidentiality
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
Aggregates
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
biblio
Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Submitted by grigby1 on Thu, 07/09/2020 - 1:58pm
privacy analysis
word representations
vast data stores
utility experiments highlight
user privacy
training machine learning models
text analysis
supporting data driven decisions
semantic generalization
Scalability
Resiliency
resilience
pubcrawl
proof satisfying dx-privacy
probability
privacy experiments
arbitrary piece
privacy
nonHamming distance metrics
learning (artificial intelligence)
Human Factors
Human behavior
high dimensional hyperbolic space
hierarchical representations
expected privacy
downstream machine learning models
document redaction
differential privacy
Data Sanitization
data privacy
data deletion
Compositionality
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
…
next ›
last »