Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data integrity
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 1:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
metadata
valuable scientific data
Systems architecture
system architecture
Software Architecture
Software
scientific information systems
Scalability
Resiliency
resilience
pubcrawl
preservation metadata
PREMIS
object transformation
Metadata Discovery Problem
Chemicals
meta data
mapping rules
Grammar
format verification
format migration
e-science
digital signatures
digital signature
digital preservation
data intensive scientific discovery
data integrity
data fixity
data authenticity
Compositionality
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
GEMˆ2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
outsourcing
unique gas cost model
trusted storage
range query
meta-data
immutability property
hybrid-storage blockchain
hybrid storage architecture
GEM2-tree
gas-efficient structure
authenticated range queries
Authenticated query
authenticated data structure
ADS maintenance cost
smart contract
Outsourced Database Integrity
Cryptography
storage management
blockchain technology
Indexes
smart contracts
Distributed databases
data structures
query processing
consensus protocol
blockchain
Metrics
composability
pubcrawl
Resiliency
Data models
data integrity
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »