Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic solutions
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Quantum Cryptography on IBM QX
Submitted by grigby1 on Wed, 03/04/2020 - 3:13pm
quantum key distribution protocol
pubcrawl
quantum
quantum bit commitment
quantum computation
quantum computers
quantum computing security
quantum computing
quantum cryptography
Quantum Key Distribution
Protocols
quantum machines
quantum protocols
Qubit
Resiliency
Scalability
security shifts
statistical analysis
telecommunication security
theoretical cryptography
distributed keys
BB84 protocol
BB84 theoretical expected results
classical computers
composability
Compositionality
computational power
Cryptographic Protocols
cryptographic solutions
Cryptography
BB84
electronic transactions
encoding functions
existing classical algorithms 100% breakable
IBM QX software
intended parties
Logic gates
mathematical complexity
practical implementation results
Predictive Metrics