Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
A new vehicular blackbox architecture based on searchable encryption
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
insurance company
resilience
Resiliency
composability
pubcrawl
vehicular context
vehicular blackbox architecture
vehicles
vehicle owner
searchable symmetric encryption
multiple use cases
law enforcement authorities
Cryptography
Companies
chain of custody
Blackbox system
Accidents
accident investigation
searchable encryption
security
Insurance
data privacy
encryption
biblio
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Permissioned blockchain Network
medical care providers
medical data items
medical information systems
medical record sharing
Medical services
patient care
patient care-cycle
patient data
patient Emergency relevant medical data
patient visits
patient walk
Peer-to-peer computing
hospitals
prehospital death rates
pubcrawl
Scalability
Scalable blockchain
scalable data source
Scalable Security
secure data source
security of data
Servers
trauma care
trauma centers
emergency medical care
blockchain
blockchain technology
confidentiality
continuous recording system
data audibility
data authentication
data privacy
data scalability
Data Security
distributed ledger
electronic data interchange
annual mortality rate
Emergency medical services
emergency patient death rate
emergency services
emergency-relevant medical data
Fabrics
file transfer methods
health care
health care delivery system
healthcare providers
healthcare settings
high quality prehospital care
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
named data network
tools
telecommunication network topology
telecommunication network routing
telecommunication channels
signature based defense
side-channel timing response
side-channel timing attack
Scalability
Resiliency
resilience
pubcrawl
privacy
NDN
Named Data Network Security
Attack detection
IP networks
internet
delays
data privacy
Cryptography
countermeasure methods
content privacy
consumer privacy
computer network security
Cathode ray tubes
cache storage
brute force timing attack
brute force attack model
biblio
User Privacy Protection for Cloud Computing Based Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security
power system reliability
power system security
privacy
privacy protection
pubcrawl
Reliability
resilience
Resiliency
Scalability
power engineering computing
Smart Grid
smart grid communication system
Smart Grid Privacy
Smart Grids
smart meter system
smart meters
smart power grids
user privacy protection
data security issue
Cloud Computing
collaboration
composability
Conferences
data chunk storage
data combination privacy
data insertion
data privacy
data searching
chunk relationship confusion
electric system efficiency
electric system reliability
electric system safety
electrical safety
Human behavior
Human Factors
Metrics
policy-based governance
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
biblio
Towards a Framework for Engineering Smart-Grid-Specific Privacy Requirements
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
pubcrawl
trees (mathematics)
threat tree analysis
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
security of data
security
Scalability
Safety
Resiliency
resilience
collaboration
project-specific refinement
privacy requirements engineering method
privacy
policy-based governance
Metrics
Human Factors
Human behavior
high level privacy requirement
electric system
data privacy
Context
composability
biblio
Model-Based Assessment for Balancing Privacy Requirements and Operational Capabilities in the Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Resiliency
optimal balancing algorithm
policy-based governance
power generation protection
power system security
privacy
Privacy Requirements
privacy-aware data processing
privacy-aware data storage
pubcrawl
resilience
operational requirement
Scalability
security
Smart Grid
Smart Grid Privacy
Smart Grids
Smart Metering
smart power grids
University of Southern California
USC microgrid
Human behavior
billing
collaboration
common high-level use case
composability
data privacy
demand response
distributed power generation
forward mapping privacy
Heterogeneous systems
approximation theory
Human Factors
Load Curtailment
Mathematical model
merging
Metrics
model-based assessment
numeric approximation
Numerical models
operational capabilities
« first
‹ previous
…
62
63
64
65
66
67
68
69
70
…
next ›
last »