Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
k-anonymity
Scalability
Resiliency
pubcrawl
private data
privacy models
privacy infringement
privacy guarantee rate
privacy enhancement
privacy assurance
privacy
Policy
Metrics
accurate data
Influenza
Human Factors
differential privacy
diff-anonym algorithm
data privacy
Data models
data anonymity
Computers
Cloud Computing
cloud
big data privacy
Big Data
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
Achieving Secure and Differentially Private Computations in Multiparty Settings
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
privacy
security
Secure computation
Scalable Security
scalable
Scalability
Regression
pubcrawl
Protocols
Computational modeling
Predictive models
multiparty
linear regression
distributed differential privacy
Distributed databases
differential privacy
data privacy
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Online banking
triple DES algorithm
transmission process
smart cards
Smart card
Servers
secret filming
secret code
Resiliency
QR codes
QR code
pubcrawl
Personal Identification Number
peeping attack
ATM machine
Mobile Applications
Mobile Application
encoded QR information
DES algorithm
Databases
data privacy
Data Encryption Standard
cyber physical systems
Cryptography
Automated Teller Machine
authorisation
authentication system
authentication
biblio
Privacy-preserving pattern matching over encrypted genetic data in cloud computing
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
genomics
testing
secure DNA sequence matching problem
Resiliency
regular clinical laboratory tests
pubcrawl
privacy-preserving pattern matching
privacy guarantee
privacy
personalized medicine
personal genomics services
pattern matching
Metrics
Human behavior
health care model
health care
biology computing
genome matching problem
Genetics
encryption
encrypted genetic data
DNA information
DNA data privacy
DNA data
DNA cryptography
DNA
diseases
data privacy
Cryptography
Computational modeling
Cloud Computing
biblio
Identifying Personal DNA Methylation Profiles by Genotype Inference
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
whole-genome sequencing
Resiliency
pubcrawl
privacy-sensitive data
privacy
predictive medicine
personalized medicine
personal DNA methylation profiles
Metrics
medical computing
Law
inference mechanisms
human health
bioinformatics
health care
genotype inference
genomics
genomic data
epigenetic element
DNA methylation data
DNA cryptography
DNA
data privacy
Cryptography
cryptographic scheme
Cancer
biomedical research community
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption
biblio
Privacy-safe linkage analysis with homomorphic encryption
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
linkage disequilibrium measures
genome data
genome data privacy
genomic data
genomics
Homomorphic encryption
homomorphic encryption schemes
Human Factors
human genome
genome analyses algorithms
Metrics
patient response
personalised medicine
privacy-safe linkage analysis
pubcrawl
Resiliency
Scalability
diseases
association analysis
bioinformatics
biologically coded information
biology computing
contingency table
Cryptography
data privacy
disease
allele-allele
encrypted domain
encryption
gene phenotypes
genetic data
genetic epidemiology
genetic locus
Genetics
« first
‹ previous
…
88
89
90
91
92
93
94
95
96
…
next ›
last »