Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data sharing
biblio
LUT based secure cloud computing #x2014; An implementation using FPGAs
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
Games
Table lookup
suitable hardware platform
security requirements
security of data
secure cloud computing scheme
program security
pattern clustering
LUT based secure cloud computing
look-up table
k-means clustering algorithm
Big Data
FPGA
Formalization
field programmable gate arrays
encryption
data sharing
data security problem
cryptographic techniques
Cloud Computing
big data processing
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 8:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
file
WINE: Data-Intensive Experiments in Security
Submitted by Katie Dey on Tue, 12/11/2012 - 8:44pm. Contributor:
Tudor Dumitraș
SaTC Posters
zero-day
Symantec Research Labs
intrusion-detection telemetry
data sharing
Big Data
anti-virus telemetry
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3
4
5