Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data integrity
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
message passing
standard mechanisms
smart devices
security service
onion routing
MQTT-SN
MQTT
message exchange
dynamic broker bridging mechanism
Broker Bridging
anonymous communications
MQTT protocol
anonymity
Metrics
encryption
Routing
composability
Databases
Protocols
internet
data integrity
data privacy
data confidentiality
computer network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Distributed Power System Simulation using Cyber-Physical Testbed Federation: Architecture, Modeling, and Evaluation
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
physical disturbances
Wide Area Monitoring System cyber-physical security
WAMS
two-bus system
transmission line modeling technique
transmission line modeling (TLM)
Testbed Federation
smart power grids
simulations
security of data
Resiliency
resilience
pubcrawl
power system simulation
power system security
attack-resilient smart grid
Metrics
load subsystems
internet
distributed simulation
distributed power system simulation
data integrity attack
data integrity
cyber-physical testbed federation
cyber-physical systems
cyber security
CPS modeling
CPS
composability
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
PTAD:Provable and Traceable Assured Deletion in Cloud Storage
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
incomplete deletion
verification stage
unlinking stage
traceable
storage management
Scalability
pubcrawl
PTAD scheme
PTAD
provable and traceable assured deletion
provable
privacy
overwriting stage
assured deletion
Hyper-ledger Fabric
formal verification
efficient deletion method
Distributed databases
design algorithms
deleted data
data integrity checking
data integrity
data deletion
cloud storage
Cloud Computing
chaincode
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
An anomaly detection approach for enterprise file integration
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
file transfer processes
corporate systems
effective self-learning anomaly detection module
emergency services
enterprise file integration
enterprise systems
file integration
file malfunction
file size
file structure
alarm system
file transfers
integration channels
integration duration
novel anomaly detection approach
organization work process management
real-time file integrations
transfer logs
transferring files
Anomaly Detection
Organizations
data integrity
information security
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Metrics
security of data
Intrusion Detection
Standards organizations
middleware
security issues
information system
emergency management
accountability
network accountability
biblio
Identifying Security Spots for Data Integrity
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
malware
tools
security spots identification
Security spot
security of data
Resiliency
resilience
pubcrawl
program diagnostics
object-oriented programs
object-oriented programming
object oriented security
Metrics
benign code
malicious code
integrity breach conditions
Integrity breach condition
insiders
insider attack
IBCs
Databases
data integrity
Couplings
coupling
composability
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »