Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security model
biblio
Secure Deduplication with Efficient and Reliable Convergent Key Management
Submitted by BrandonB on Wed, 05/06/2015 - 1:37pm
private key cryptography
storage space reduction
storage management
Servers
security model
secure deduplication
reliable convergent key management
Reliability
ramp secret sharing scheme
public key cryptography
proof of ownership
baseline key management scheme
key management
encryption
Educational institutions
Dekey
Deduplication
data deduplication
convergent encryption
cloud storage
Cloud Computing
Bismuth
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Cybersecurity Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Validation and Verification
Foundations
Cybersecurity dynamics
foundations
modeling
Science of Security
Security analysis
security model
validation and verification
ACM CCS
Cyber Security
file
Cybersecurity Dynamics (poster)
Submitted by shouhuai on Wed, 06/04/2014 - 9:43am. Contributor:
Shouhuai Xu
Cybersecurity dynamics
Security analysis
security model
HotSoS 2014
Academia
Poster
Posters
Posters
« first
‹ previous
1
2
3