Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data sharing
biblio
A Multi-Level Secure File Sharing Server and Its Application to a Multi-Level Secure Cloud
Submitted by grigby1 on Mon, 03/19/2018 - 1:34pm
multilevel secure file sharing server
Servers
security of data
Security kernel
Secure File Sharing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Network file service
Multi-Level Security
Cloud Computing
multilevel secure cloud
Metrics
Kernel
Human behavior
GEMSOS
file servers
data sharing
computer security
computer architecture
composability
biblio
Target Tracking Optimization of UAV Swarms Based on Dual-Pheromone Clustering
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
surveillance result propagation
Aircraft
wireless communication interface
Unmanned Aerial Vehicles
UAV swarm
UAV network connectivity
temporarily invisible targets
target tracking optimization
target tracking
target detection
ant colony optimisation
surveillance mission
surveillance
stable overlay network
Resiliency
repulsive pheromones
object detection
reconnaissance mission
pubcrawl
pattern clustering
data sharing
Network reconnaissance
multihop clustering
multi-robot systems
map coverage performance
dual-pheromone clustering hybrid approach
dual-pheromone ant-colony model
DPCHA
disappearing target model
autonomous aircraft
autonomous aerial vehicles
coverage fairness
connection volatility
communication range
collaborative swarm
Clustering algorithms
cluster stability
Base stations
attractive pheromones
Atmospheric modeling
biblio
Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Knowledge Discovery
Scalability
Resiliency
railway freight service
pubcrawl
privacy protection
privacy
Policy
Metrics
Algorithm design and analysis
Human Factors
Handheld computers
Distributed databases
differential privacy
data sharing
data privacy
big data privacy
apriori
biblio
DataSynthesizer: Privacy-Preserving Synthetic Datasets
Submitted by grigby1 on Wed, 01/10/2018 - 12:39pm
Compositionality
privacy
pubcrawl
Resiliency
Human behavior
Human Factors
collaboration
data sharing
differential privacy
Synthetic Data
Policy
Data Sanitization
biblio
Commoner Privacy And A Study On Network Traces
Submitted by grigby1 on Wed, 01/10/2018 - 12:39pm
Compositionality
privacy
pubcrawl
Resiliency
Human behavior
Human Factors
collaboration
data sharing
network traces
Policy
Data Sanitization
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 2:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
« first
‹ previous
1
2
3
4
5
next ›
last »