Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical task
biblio
Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements
Submitted by aekwall on Mon, 02/22/2021 - 1:40pm
Multidimensional Model
Data Warehouse technology
decision-makers
decision-making processes
decisional-users requirements
DW design
DW model
DW multidimensional schema
great challenge research domain
multidimensional components
Data Warehouse
natural language
natural language NL-template
NL-templates
OLAP
On-Line-Analytical-Processing queries
query-like English sentences
requirement-gathering phase
Star schema
natural language processing
Ontologies
Task Analysis
Resiliency
Human behavior
pubcrawl
query processing
tools
Decision Making
data analysis
Scalability
Writing
Data Analytics
data warehouses
cleaning
critical task
Natural languages
complex task
Constellation schema
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption