Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed ledgers
biblio
Towards Enabling Deletion in Append-Only Blockchains to Support Data Growth Management and GDPR Compliance
Submitted by aekwall on Mon, 01/11/2021 - 12:30pm
deletion
data deletion
Worm
truncation
rollover
Regulation
redactability
PII
Mutability
modifiability
erasability
editability
DLT
Scalability
append-only storage
decentralization
personally identifiable information
distributed ledgers
Consensus
GDPR
Semantics
privacy
blockchain
pubcrawl
Conferences
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by aekwall on Mon, 09/21/2020 - 2:40pm
streaming data
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
Data marketplace
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
data providers
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
Cryptography
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information