Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CipherText Policy Attribute Based Encryption
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption