Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Research on K Anonymity Algorithm Based on Association Analysis of Data Utility
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
K anonymity
Resiliency
resilience
Publishing
pubcrawl
Privacy preserve
principal component analysis
personal privacy information
personal identity
PCA-GRA K anonymous algorithm
optimization
Metrics
medical information systems
medical data privacy
K anonymity algorithm
Algorithm design and analysis
information loss
Human behavior
grey systems
Grey relational analysis K anonymous algorithm
feature maintenance
data utility
data privacy
data analysis
correlation coefficient
Correlation
composability
classification evaluation performance
association analysis
anonymity
biblio
An Improved (k,p,l)-Anonymity Method for Privacy Preserving Collaborative Filtering
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
matrix sparsity reduction
Resiliency
resilience
recommender systems
pubcrawl
Privacy Preserving Collaborative Filtering
privacy
PPCF
Perturbation methods
Partitioning algorithms
obfuscation methods
Metrics
Maximum Distance to Average Vector microaggregation algorithm
anonymity
matrix algebra
Latent Factor Model
k-anonymity method
Human behavior
data privacy
data aggregation
Cryptography
cryptographic methods
composability
collaborative filtering
collaboration
biblio
(L, m, d) \#x2014; Anonymity : A Resisting Similarity Attack Model for Multiple Sensitive Attributes
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Metrics
trees (mathematics)
similarity attack
sensitive information leakage
semantic similarity
resisting similarity attack model
Resiliency
resilience
pubcrawl
privacy-preserving models
privacy preservation
multiple sensitive attributes situation
multiple sensitive attributes similarity attack
(1
m)-diversity model
m
Human behavior
equivalence classes
dimension sensitive attribute
data release
data publishing
data privacy
d)-anonymity model
composability
anonymity
(l
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
biblio
A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-Keyword Ranked Search
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Secure
outsourcing
pubcrawl
query processing
ranked search
resilience
Resiliency
resource pooling
search problems
multikeyword
secure cloud server operation
Secure File Sharing
secure technique
sensitive data
Servers
TF × IDF model
update
update operation
dynamic
cloud
Cloud Computing
composability
computational overhead
Cryptography
data owners
data privacy
data users
Amazon EC2 cloud server
dynamic operation
dynamic searchable encryption scheme
encryption
Human behavior
Indexes
Metrics
multi-keyword
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
« first
‹ previous
…
84
85
86
87
88
89
90
91
92
…
next ›
last »