Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure environment
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 8:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts
Submitted by aekwall on Mon, 04/13/2020 - 9:22am
contracts
Trustworthy Systems
trustworthy IoT assurance evaluation
trustworthy evidence collection
smart IoT systems clash
service-based methodology
mobile end users
hyperledger fabric blockchain
cloud-based applications
Assurance Evaluation
secure environment
cyber physical systems
interconnected devices
IoT
smart contracts
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
Internet of Things
Cloud Computing
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
An authorized security middleware for managing on demand infrastructure in cloud
Submitted by grigby1 on Mon, 06/11/2018 - 2:45pm
On-demand security
cloud demand infrastructure management
cloud stack
Dual authorization
Dual-Authorization
Dynamic infrastructure request control
handle On-demand Infrastructure request
IaaS
on-demand request
on-demand scheduler
auto scalability feature
on-demand service request handling
rapid elasticity
secure environment
security risks
ubiquitous computing
ubiquitous network access
virtualized computing platform
VM
middleware security
tools
pubcrawl
composability
Scalability
security of data
Cloud Computing
Servers
cloud users
virtualisation
authorization
resilience
Heuristic algorithms
security issues
middleware
Resiliency
Policy
collaboration
policy-based governance
authorized security middleware
Auto scalability