Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud
biblio
Chaotic Searchable Encryption for Mobile Cloud Storage
Submitted by K_Hooper on Wed, 02/14/2018 - 11:09am
chaos
cloud
Cloud Computing
composability
encryption
Keyword search
locality sensitive hashing
Mobile communication
pubcrawl
Resiliency
searchable encryption
security
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 12:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by grigby1 on Tue, 02/06/2018 - 12:42pm
k-anonymity
Scalability
Resiliency
pubcrawl
private data
privacy models
privacy infringement
privacy guarantee rate
privacy enhancement
privacy assurance
privacy
Policy
Metrics
accurate data
Influenza
Human Factors
differential privacy
diff-anonym algorithm
data privacy
Data models
data anonymity
Computers
Cloud Computing
cloud
big data privacy
Big Data
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
Metadata Discovery Problem
tools
standards
software packaging knowledge
software packages
software management
software engineering
software discovery
Scalability
Resiliency
querying package management tools
pubcrawl
program diagnostics
problem diagnosis
Packaging
Operational analytics
agile development practices
metadata
meta data
machine learning methods
licensing requirement compliance
learning (artificial intelligence)
filesystem tree introspection
file metadata
feature extraction
drift detection situations
Docker Images
data structures
Compositionality
Columbus
Cloud Computing
cloud
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
image encryption
Servers
server
Scientific Computing Security
Resiliency
public key cryptosystem
public key cryptography
pubcrawl
photography
NTRU
multiagent system
Metrics
Image quality
aerial photography
image capture
Homomorphic encryption
encryption
drones
Drone
concatenation
Compositionality
Cloud Computing
cloud
Amazon EC2 cloud server
aerial photography security
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »