Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud
biblio
Surveing the challenges and requirements for identity in the cloud
Submitted by BrandonB on Wed, 05/06/2015 - 12:28pm
user identity federation
Access Control
authentication
business organizations
Claim
cloud
Cloud Computing
cloud service providers
cloud technologies
Computational modeling
security of data
Token
security
Computers
computing resource sharing
data centers
Federated identity
federated identity management
Federation provider
hybrid clouds
Identity provider
Organizations
SaaS
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 10:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
Harnessing the Cloud for Teaching Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 9:55am
cloud
Cloud Computing
computer security
Cybersecurity
long distance education
network security
security
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
biblio
Enabling efficient access control with dynamic policy updating for big data in the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 8:23am
abe
Access Control
access policy
attribute-based encryption
authorisation
Big Data
cloud
Cloud Computing
Cryptography
dynamic policy updating
encryption
end-to-end security
outsourced policy updating method
Policy Updating
Public key
Servers
biblio
Counteracting security attacks in virtual machines in the cloud using property based attestation
Submitted by BrandonB on Fri, 05/01/2015 - 8:15am
cloud
malware
Rootkits
TPM attestation
Trusted Computing
Virtual machine monitors
Zero day attacks
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 12:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
biblio
Cloud Computing Vulnerability: DDoS As Its Main Security Threat, and Analysis of IDS As a Solution Model
Submitted by BrandonB on Thu, 04/30/2015 - 12:14pm
cloud
DDoS
IDS
security
Vulnerability
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »