Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 1:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
biblio
Building Trust in the Human?Internet of Things Relationship
Submitted by BrandonB on Thu, 04/30/2015 - 1:30pm
digital systems
Internet of Things
Internet of Things relationship
IoT technologies
model-based approach
privacy
prototype implementation
security
Senior citizens
Smart homes
Trust management
Trusted Computing
trusted human-IoT relations
biblio
Periodic and event-triggered communication for distributed continuous-time convex optimization
Submitted by BrandonB on Thu, 04/30/2015 - 12:56pm
event-triggered communication
Zeno behavior
Topology
synchronous periodic communication scheme
strongly connected weight-balanced directed graph
privacy preservation properties
privacy
periodic communication
Optimization algorithms
network theory (graphs)
network optimization problem
global cost function
Algorithm design and analysis
distributed continuous-time convex optimization
distributed continuous-time algorithm
directed graphs
cost functions
Cost function
convex programming
Convex functions
convex function
convergence
Control of networks
connected undirected graph
biblio
Periodic and event-triggered communication for distributed continuous-time convex optimization
Submitted by BrandonB on Thu, 04/30/2015 - 12:55pm
event-triggered communication
Zeno behavior
Topology
synchronous periodic communication scheme
strongly connected weight-balanced directed graph
privacy preservation properties
privacy
periodic communication
Optimization algorithms
network theory (graphs)
network optimization problem
global cost function
Algorithm design and analysis
distributed continuous-time convex optimization
distributed continuous-time algorithm
directed graphs
cost functions
Cost function
convex programming
Convex functions
convex function
convergence
Control of networks
connected undirected graph
file
Memory Trace Oblivious Program Execution for Cloud Computing
Submitted by changliu on Wed, 04/29/2015 - 11:22am. Contributors:
Chang Liu
Michael Hicks
Elain Shi
Austin Harris
Martin Maas
Mohit Tiwari
Science of Security
Foundations
Cloud Computing
privacy
crypto
PL
HotSoS 2015
Academia
Presentation
Presentations
file
Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events
Submitted by Laurie Williams on Wed, 04/29/2015 - 11:18am. Contributors:
Jason King
Rahul Pandita
Laurie Williams
Science of Security
Foundations
privacy
Forensics
Heuristics
HotSoS 2015
Academia
Presentation
Presentations
file
Towards a Science of Trust
Submitted by Dusko P on Wed, 04/29/2015 - 11:12am. Contributor:
Dusko Pavlovic
Testing
Science of Security
University of Hawaii
trust
privacy
HotSoS 2015
Academia
Poster
Presentation
Presentations
Quarter 3: Feb'15 - Apr'15
file
Private Disclosure of Information
Submitted by daranki on Thu, 04/23/2015 - 6:44pm. Contributors:
Daniel Aranki
Ruzena Bajcsy
Presented as part of the
2015 HCSS conference
.
Abstract:
Health Care
privacy
National HCSS Conference 2015
Academia
Abstract
Presentation
HCSS'15
Privacy (HCSS'15)
file
Privacy through Accountability
Submitted by anupamdatta on Thu, 04/23/2015 - 6:44pm. Contributor:
Anupam Datta
Presented as part of the
2015 HCSS conference
.
Abstract:
accountability
Policy
privacy
National HCSS Conference 2015
Academia
Abstract
HCSS'15
Privacy (HCSS'15)
« first
‹ previous
…
240
241
242
243
244
245
246
247
248
next ›
last »