Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge devices
biblio
Remote Attestation as a Service for Edge-Enabled IoT
Submitted by aekwall on Tue, 01/25/2022 - 3:49pm
Prototypes
Trusted Platform Module (TPM)
Smart healthcare
Remote Attestation
edge devices
data centers
Constrained Devices
attestation
Costs
Image edge detection
composability
Human behavior
Resiliency
pubcrawl
edge computing
Internet of Things (IoT)
performance evaluation
Cloud Computing
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
edge devices
Computing Theory and Privacy
sample data models
privacy architecture
practical data model
Message Queuing Telemetry Transport
fog-to-cloud computing systems
fog architecture
DPPforF2C
data service model
Data Privacy for Fog-to-Cloud (DPPforF2C)
data portfolio
data management portfolio
Advanced Message Queuing Protocol
telemetry
queueing theory
IoT
fog nodes
data management
Data models
Fog computing
Data Transmission
middleware
Protocols
pubcrawl
Human behavior
Resiliency
Internet of Things
privacy concerns
data privacy
Scalability
Cloud Computing
biblio
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
smart surveillance
privacy
privacy protection
pubcrawl
real-time video analytics
resilience
Resiliency
Scalability
secure privacy-preserving solution
policy-based enforcement
surveillance cameras
Transforms
video access sanctioning
video signal processing
video surveillance
video surveillance system security
VSS security
edge devices
blockchain technologies
Cryptography
data privacy
Data protection
Deterrence
Distributed databases
edge detection
edge device
blockchain security
federated blockchain network
Human behavior
Internet of Things
Lib-Pri system transforms
lightweight blockchain
lightweight privacy-preserving solution
Off-Site Storage
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols