Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
GEMˆ2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
outsourcing
unique gas cost model
trusted storage
range query
meta-data
immutability property
hybrid-storage blockchain
hybrid storage architecture
GEM2-tree
gas-efficient structure
authenticated range queries
Authenticated query
authenticated data structure
ADS maintenance cost
smart contract
Outsourced Database Integrity
Cryptography
storage management
blockchain technology
Indexes
smart contracts
Distributed databases
data structures
query processing
consensus protocol
blockchain
Metrics
composability
pubcrawl
Resiliency
Data models
data integrity
biblio
EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database outsourcing
token enforced cloud storage
search results provability
Query Auditing
outsourcing computation
Invertible Bloom Filter
Integrity Auditing
information proprietor
efficient auditing for outsourced database
EAODBT
database privacy
database encryption
database administration
cloud service provider
Outsourced Database Integrity
security of data
outsourcing
storage management
security issues
database management systems
Reliability
Databases
Metrics
composability
pubcrawl
Resiliency
security
data privacy
IP networks
Cloud Computing
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 1:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 12:18pm
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Handling concurrent requests in a secret sharing based storage system using Petri Nets
Submitted by grigby1 on Tue, 10/06/2020 - 2:02pm
perfect security
storage system
storage servers
storage management
server failure
security
secret sharing schemes
secret sharing
Resiliency
resilience
pubcrawl
Petri nets
composability
Metrics
distributed computer network
data theft
data storage security
cyber physical systems
Cryptography
CPS
concurrent update requests
concurrent request handling
concurrency (computers)
Concurrency
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
Scalability
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
memory storage
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
Hessian matrices
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
approximation theory
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »