Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
EARRING: Efficient Authentication of Outsourced Record Matching
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
integrity
VO
verification object
third-party server
specific distance metrics
Servers
security
Resiliency
record matching
pubcrawl
outsourcing paradigm
outsourcing
outsourced record matching framework
outsourced dataset
Outsourced Database Integrity
Cloud Computing
Information Reuse
information integration
identifying matching records
Euclidean distance
Entity Resolution
design EARRING
data privacy
data management
authentication
Big Data
correct record matching results
data integrity
Big Data Analytics
big data security metrics
biblio
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
VOs
Virtual Objects
virtual object communication
security preserving objectives
security
role-based access control
Resiliency
RBAC
radiofrequency identification
pubcrawl
privacy preserving objectives
operational models
IoT
Internet of Things
internet
ABAC
Devices
data privacy
computer architecture
cloud services
cloud-enabled IoT
Cloud Computing
Cameras
automobiles
authorisation
administrative access control models
ACL
access control lists
access-control
Access Control
biblio
Location privacy preserving protocols in database-enabled cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
wireless users
wireless spectrum
wireless services
Wireless communication
traffic redirection
telecommunication traffic
telecommunication security
SU location privacy
SU
spectrum utilization
spectrum availability
spectral availability
secondary users
Schedules
cognitive radio
pubcrawl
Protocols
privacy
mobile devices
master device enabled location privacy preserving scheme
location privacy preserving protocols
geolocation database
Databases
database enabled wireless networks
database enabled cognitive radio networks
data privacy
crowd sourced location privacy preserving scheme
Communication system security
Cognitive Radio Security
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
health care
XACML policies
XACML
similarity analysis
Security Policies Analysis
security
secure privacy-preserved EHR systems
secure integrated systems
pubcrawl
privacy
policy-based governance
patients privacy
large scale healthcare system
hospitals
Access Control
electronic healthcare systems
electronic health records
electronic health record
distributed systems
distributed processing
Data Security
data privacy
Cryptography
computer network
collaboration
authorisation
access control policy combination
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication
biblio
Security and privacy on internet of things
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT protocol
wireless sensor networks
telecommunication security
sensors
security of data
security
Resiliency
pubcrawl
Protocols
privacy
Metrics
IoT security
attacks
IoT privacy
IoT devices
Internet of Things (IoT)
Internet of Things
internet
Human Factors
Human behavior
data privacy
computer architecture
composability
biblio
Adding Support for Theory in Open Science Big Data
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive Analytics
Frameworks
functional data analysis
Human behavior
Human Factors
Mathematical model
Metrics
natural sciences computing
open science big data
Economic indicators
Principal differential analysis
Provenance
pubcrawl
Resiliency
storage management
theory
theory formation
Analytical models
data transfer
data storage
data sources
data provenance
data privacy
Data models
data fitting
data curation
data analysis
Compositionality
composability
citable reusable data
Biological system modeling
Big Data Analytics
Big Data
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
« first
‹ previous
…
90
91
92
93
94
95
96
97
98
…
next ›
last »