Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication
biblio
SoK: Eternal War in Memory
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:34pm
computer security
memory corruption attacks
memory corruption bugs
program debugging
protection mechanisms
protection techniques
security of data
software reliability
SoK
storage management
« first
‹ previous
…
6
7
8
9
10
11
12
13
14