Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
POX Controller Evaluation Based On Tree Topology For Data Centers
Submitted by grigby1 on Fri, 03/31/2023 - 10:20am
storage management
tree topology
SDN controllers
Performance Metrics.
Mininet Emulator
data center network
Resiliency
Software Defined Network
data centers
pubcrawl
big data security metrics
data analysis
Measurement
network topology
Industries
Scalability
Throughput
resilience
biblio
Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage
Submitted by grigby1 on Mon, 05/09/2022 - 3:37pm
Cloud Computing
pubcrawl
resilience
Resiliency
data privacy
cloud storage
energy consumption
Public key
data integrity
Scalability
Privacy-preserving
storage management
user privacy in the cloud
CertificateLess cryptography
Lead acid batteries
remote data integrity checking
biblio
Secure Count Query on Encrypted Heterogeneous Data
Submitted by grigby1 on Thu, 02/10/2022 - 2:19pm
applied cryptography in data security
storage management
Sequential analysis
secure cloud computing
outsourcing
heterogeneous data.
genomics
encryption
data privacy
bioinformatics
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
1
2
3
4
5
6
7
8
9
…
next ›
last »