Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data integrity
biblio
Privacy Preserving in TPA for Secure Cloud by Using Encryption Technique
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
secure cloud
privacy identification
privacy preserving
Protocols
pubcrawl
public auditing
public verifiers
resilience
Resiliency
Metrics
Secure storage
Servers
shared data
software/hardware error
Task Analysis
TPA
VerifyProof
data services
auditing task
Cloud Computing
cloud data
Compositionality
Cryptography
data holders
data integrity
data privacy
auditing
EAP
encryption
encryption audits
Encryption technique
extensible authentication protocol
human error
liberated encryption standard
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
A Remote Data Integrity Checking Scheme for Big Data Storage
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
fine-grained update
Servers
Scalability
remote data integrity checking scheme
remote data integrity checking
pubcrawl
privacy
Memory
mapping relationship
Indexes
Balanced update tree
dynamic update
data structures
data privacy
Data models
data integrity
data deletion
data block
big data storage
Big Data
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Design pattern for secure object oriented information systems development
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Metrics
user interface
Secure Software Design
secure object oriented information systems development
Secure Information Systems
object-oriented methods
object oriented design patterns
object oriented design framework
Design patterns
data availability
application security
object-oriented programming
Resiliency
security
data integrity
resilience
Unified modeling language
Information systems
Software
security of data
composability
data confidentiality
information security
pubcrawl
cyber-physical systems
Concurrency
biblio
Adaptive models for security and data protection in IoT with Cloud technologies
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Metrics
virtualised sensor nodes
virtual reflection
sensors
sensor-cloud security
sensor-cloud architecture
security
secure association
Resiliency
resilience
Reliability
pubcrawl
Protocols
privacy
multilayer client-server model
Microelectronics Security
adaptive models
IoT
Internet of Things
Hardware
gateways
data storage
Data protection
data privacy
data integrity
computer architecture
composability
cloud technologies
Cloud Computing
authorization
authentication
application servers
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
Privacy-Preserving and Multi-Dimensional Range Query in Two-Tiered Wireless Sensor Networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
multidimensional range query protocol
wireless sensor networks
two-tiered wireless sensor networks
Silicon
sensor electronic devices
Resiliency
resilience
query processing
pubcrawl
Protocols
probability attacks
privacy-preserving range query
PERQ
network accountability
Biomedical monitoring
Monitoring
modular arithmetic range query mechanism
Metrics
Heart rate
generalized distance-based range query mechanism
differential attacks
data privacy
data integrity
cyclic modular verification scheme
Cryptographic Protocols
composability
Collusion Attacks
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
energy consumers
smart power grids
smart meters
Smart Grids
smart grid consumer privacy
Smart Grid
real-time usage data
pubcrawl
privacy
power engineering computing
Human Factors
fine-grained access control
fine- grained data access control
Access Control
encryption
Decision trees
data utility
data privacy preservation
data privacy
data integrity
data aggregation scheme
data aggregation
control center
authorisation
attribute decision tree
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »