Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
How to Overcome Cognitive Biases That Threaten Data Security
Submitted by willirn1 on Tue, 09/24/2019 - 3:21pm
Cognitive Security
Cognitive Security in Cyber
Data Security
cognitive biases
biblio
Fine-Grained Big Data Security Method Based on Zero Trust Model
Submitted by grigby1 on Mon, 08/05/2019 - 11:40am
fine-grained big data security method
zero trust model
zero trust
security of data
Scalability
risky data access
Resiliency
resilience
pubcrawl
policy-based governance
legacy security technologies
Human Factors
Human behavior
fine-grained data access authentication control
Big Data
drugs
data security risks
data security domain
Data Security
data processing capacity
data privacy
data access audit
Conferences
big data usage
Big Data technology
big data security control
big data environment
biblio
A Third Party Audit Mechanism for Cloud Based Storage Using File Versioning and Change Tracking Mechanism
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
integrity data
version information
third party auditor
third party audit mechanism
storage management
Servers
security of data
Security Audits
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
party auditor
Memory
audit process
Human Factors
Human behavior
hash information
file versioning
file owner
encryption
Data Security
data privacy
data integrity
cloud storage server
Cloud Computing
cloud based storage
change tracking mechanism
auditing
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 9:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
biblio
Performance Evaluation on IoT Devices Secure Data Delivery Processes
Submitted by aekwall on Wed, 05/01/2019 - 12:42pm
performance evaluation
IoT protocols
cryptography algorithms
Metrics
composability
pubcrawl
Resiliency
network security
information security
embedded systems
Data Security
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
biblio
Research Issues Based on Comparative Work Related to Data Security and Privacy Preservation in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 3:16pm
NIST
smart power grids
smart meters
Smart Grids
smart grid data communication
Smart Grid
secure data communication
pubcrawl
privacy preservation
privacy
power system security
power engineering computing
Smart Grid Privacy
Metrics
Human behavior
electric grids
Data Security
data privacy
data communication
cyber-threat
customer-safety
Cryptography
composability
authorisation
biblio
Cloud Computing Security and Privacy
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
Cloud Computing
privacy
security
standards
pubcrawl
Data Security
big data privacy
biblio
Attribute-based proxy re-encryption method for revocation in cloud storage: Reduction of communication cost at re-encryption
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
revoked users
easy storage
huge communication costs
hybrid encryption scheme
matching attributes
privacy concerns
Proxy re-encryption
proxy re-encryption method
revocation
data privacy
Syalim encryption scheme
symmetric encryption scheme
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
AES key
Scalability
Servers
Access Control
Cryptography
Data Security
encryption
abe
advanced encryption standard
Cloud Computing
attribute-based encryption
Attribute-Based Encryption (ABE)
Big Data
cloud storage
communication cost
Computational efficiency
data owner
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »