Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud storage
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
PTAD:Provable and Traceable Assured Deletion in Cloud Storage
Submitted by grigby1 on Fri, 07/10/2020 - 10:40am
incomplete deletion
verification stage
unlinking stage
traceable
storage management
Scalability
pubcrawl
PTAD scheme
PTAD
provable and traceable assured deletion
provable
privacy
overwriting stage
assured deletion
Hyper-ledger Fabric
formal verification
efficient deletion method
Distributed databases
design algorithms
deleted data
data integrity checking
data integrity
data deletion
cloud storage
Cloud Computing
chaincode
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 8:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
ChainFS: Blockchain-Secured Cloud Storage
Submitted by aekwall on Mon, 06/01/2020 - 9:48am
forking attacks
trusted Blockchain
storage management
Servers
security of data
Resiliency
resilience
Public key
pubcrawl
policy-based governance
middleware system
middleware security
middleware
History
Fuses
Amazon S3 cloud storage
fork consistency
file-system interface
file system
file operation logging
composability
cloud-storage security
cloud storage services
cloud storage
Cloud Security
Cloud Computing
ChainFS middleware
ChainFS data file storage
blockchain-secured cloud storage
blockchain
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 11:28am
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
Lightweight Searchable Encryption Scheme Based on Certificateless Cryptosystem
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
keyword encryption
resilience
Resiliency
composability
pubcrawl
third-party manager
secret value
searchable encryption technology
searchable encryption schemes
searchable encryption
public key cryptography
partial private key
multiuser ciphertext retrieval
lightweight searchable encryption scheme
Lightweight
Cryptography
key escrow problem
identity-based cryptosystem
file index
digital signatures
data owner stores
cloud storage environments
cloud server
ciphertext data
certificateless encryption schemes
certificateless cryptosystem
certificate management problem
cloud storage
private key cryptography
cloud data
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Research on the IPv6 Technical Defects and Countermeasures
Submitted by grigby1 on Tue, 01/21/2020 - 11:07am
ipv6 security
transport protocols
TCP/IP protocol cluster
Spliced Address
security
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network topology
Metrics
IPv6 technical defects
IPv6 spliced address
Big Data
IPv6 interface ID
IPv6 address structure design ideas
IPv6
IPv4 Upgrading
IPv4
IP networks
internet
Interface ID
global Internet
composability
collaboration
cloud storage
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »