Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
data privacy
test-bed experiments
security
Scientific Computing Security
rule management
Resiliency
pubcrawl
Protocols
multicloud environment
Metrics
Elliptic curve cryptography
data-intensive scientific collaborations
advanced mission delivery networks
Cryptographic Protocols
Compositionality
collaborative networks
collaborative network
collaboration
Cloud Computing
CL-RP
CertificateLess cryptography-based rule management protocol
CertificateLess cryptography
authenticated rule registrations
AMDN design
biblio
Policy enforcement for big data security
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
Metrics
security of data
security
Scientific Computing Security
Resiliency
pubcrawl
Privacy Policy
privacy
policy enforcement
Policy
Big Data
large-scale data storage
data privacy
data analysis
Compositionality
Cloud Computing
Business
big data security
big data privacy
Big Data handling
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
User-Demand-Oriented Privacy-Preservation in Video Delivering
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
user-demand-oriented privacy-preservation
pubcrawl
Resiliency
sensitive behavior prediction
sequence privacy protection
spatial features
surveillance
temporal features
usability
privacy-preserving video delivery system
video information
Video Privacy
video privacy protection
video signal processing
video surveillance
video surveillance system
viewer-dependent pattern
Cameras
privacy demands
privacy
on-line requirements
off-line requirements
object tracking
Metrics
inference channels
Human Factors
Human behavior
Hidden Markov models
Foresight Protection
feature extraction
estimation
data privacy
context features
biblio
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Internet of Things
virtualisation
trustworthiness
trusted platform modules
Trusted Platform Module
trusted execution environments
Trusted Execution Environment
Trusted Computing
trust
secure elements
robust trust technologies
Resiliency
pubcrawl
Java Card
IoT
composability
Intel TXT
Intel SGX
hypervisors
host card emulation
GlobalPlatform TEE
GlobalPlatform
encrypted execution environment
digital trust technologies
data privacy
cyberphysical systems
cyber-physical system
Cryptography
CPS
biblio
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
collaboration
composability
data privacy
EU FP7 project
Internet of Things
IoT middleware
middleware
privacy challenges
pubcrawl
RERUM middleware
Resiliency
security
security challenges
security of data
biblio
Securing Smart Cities Using Blockchain Technology
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
Resiliency
social infrastructures
smart devices
Smart device
Smart City
smart cities
security framework
security
secure communication
Scalability
resources utilization
blockchain
pubcrawl
privacy
physical infrastructures
information technology
information security
data privacy
business infrastructures
blockchain technology
blockchain security
biblio
Convex Optimization for Linear Query Processing Under Approximate Differential Privacy
Submitted by grigby1 on Tue, 10/10/2017 - 10:45am
Computing Theory and Privacy
convergence analysis
convex optimization
data privacy
differential privacy
Human behavior
nonsmooth optimization
pubcrawl
Resiliency
Scalability
Security Heuristics
semidefinite optimization
biblio
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications
Submitted by grigby1 on Mon, 05/22/2017 - 2:05pm
data privacy
http traces
Human behavior
incident forensics
Metrics
privacy
pubcrawl
Resiliency
rich internet applications
SQL injection
SQL injection attack
traffic replay
user-interactions reconstruction
biblio
Hacking the DBMS to Prevent Injection Attacks
Submitted by grigby1 on Mon, 05/22/2017 - 2:04pm
data privacy
dbms self-protection
Human behavior
injection attacks
Metrics
privacy
pubcrawl
Resiliency
security
software security
SQL injection
SQL injection attack
web applications
« first
‹ previous
…
91
92
93
94
95
96
97
98
99
…
next ›
last »