Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Secure Policy-based Device-to-device Offloading for Mobile Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:27pm
Policy Based Governance
collaboration
Data Security
Governance
hybrid mobile cloud computing
mobile application offloading
mobile cloud computing
mobile device attestation
Policy
policy-based governance
pubcrawl
security policies
XACML
biblio
Protecting Suspended Devices from Memory Attacks
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
composability
data confidentiality
Data Security
Metrics
Operating systems security
pubcrawl
RAM encryption
Resiliency
Systems Security
biblio
An encryption based on DNA cryptography and steganography
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
encoding
Resiliency
pubcrawl
privacy
Metrics
Human behavior
Encryption and Decryption
encryption
Encoding and Decoding
AES
DNA Steganography
DNA cryptography
DNA
Data Security
data hiding
Ciphers
Amino acids
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
SDN testbed for validation of cross-layer data-centric security policies
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
operational military systems
Software-Defined Networks
software-defined networking
software defined networking
Software
Servers
security policies
security
SDN security mechanisms
Resiliency
pubcrawl
principal component analysis
Ports (Computers)
Access Control
OpenFlow-based testbed
military computing
information security
Data Security
cross-layer data-centric security policies
Cross Layer Security
control systems
Containers
computer network security
computer centres
composability
Communication system security
biblio
Design and analysis of high performance crypt-NoSQL
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
NoSQL databases
YCSB
Yahoo
storage management
SQL
Service Level Agreement
security scalability
security
secure data encryption
Scalability
relational databases
relational database security
query processing
pubcrawl
Performance
Benchmark testing
NoSQL
necessary data security
middleware layer
middleware
high performance crypt-NoSQL
encryption
Data Security
Cryptography
cryptographic methods
cloud service benchmark
cloud service
Cloud Computing
Cassandra
Big Data
biblio
A new key generator for data encryption using chaos in digital filter
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
encryption
Resiliency
pubcrawl
private key system
order system
Metrics
key generator system
key generator
internal key
initial coefficients value condition
IIR filters
high sensitive system
Generators
external key
accuracy key test
Digital filters
digital filter
Data Security
data encryption
Cryptography
composability
chaotic encryption
chaotic cryptosystem
chaotic cryptography
chaotic communication
chaos
appropriate key sensitivity
biblio
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
health care
XACML policies
XACML
similarity analysis
Security Policies Analysis
security
secure privacy-preserved EHR systems
secure integrated systems
pubcrawl
privacy
policy-based governance
patients privacy
large scale healthcare system
hospitals
Access Control
electronic healthcare systems
electronic health records
electronic health record
distributed systems
distributed processing
Data Security
data privacy
Cryptography
computer network
collaboration
authorisation
access control policy combination
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
pubcrawl
virtualisation
Virtual machining
virtual machines
Trusted Computing
trust relationship
trust layer
stress test
security system
Scalable Security
scalable computing resources
Scalability
role-based access control model
RBAC model
RBAC
Access Control
Kernel
IT ecosystems
isolation benchmarking tools
isolation benchmarking
Data Security
Data protection
Containers
container protection
Container isolation
container based virtualisation
cloud users
cloud service providers
Cloud Computing
authorisation
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »