Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
access control mechanisms
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 10:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases