Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
File I/O Performance Analysis of ZFS BTRFS over iSCSI on a Storage Pool of Flash Drives
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
Linux
BTRFS
compute-intensive systems
file I/O performance
file system
filesystem
flash drives
highly functioning storage systems
iSCSI
block device
NAS storage
open-source filesystem ZFS
storage hardware
storage pool
subvolume
ZFS
BIOS Security
Metrics
Cloud Computing
Scalability
Conferences
Bandwidth
tools
Hardware
storage management
pubcrawl
security
Resiliency
resilience
public domain software
Human Factors
performance evaluation
data management
backup storage
biblio
Security Enhancement in Storage Area Network
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
security level
resilience
Resiliency
SAN
SAN Perfromance factors
SAN protocols
SAN security framework
Scalability
security
security enhancement
public clouds
security perspective
security solution
security vulnerabilities
Servers
storage area network
Storage area networks
storage management
storage technologies
information security
cashing technologies
centralized secure place
computer network security
DAS
digital transformation
direct attached storage
Distributed databases
distributed storage technology
geographical remote locations
big data security metrics
IP networks
network attached storage
Optical fiber LAN
Optical fibers
private clouds
private nodes
Protocols
pubcrawl
biblio
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
Metrics
storage management
standards
Shamir secret sharing algorithm
security property
security
secured distributed Big Data
secure hash algorithm
Scalability
retrieving phase
Resiliency
resilience
pubcrawl
authenticity properties
encryption
dividing phase
distribution phase
distributed storage locations
Distributed databases
Cryptography
cloud location
Cloud Computing
Big Data storage scheme
big data security in the cloud
Big Data
authorizations
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
An Attribute Revocable CP-ABE Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Cloud Computing
Subset Cover
storage management
Scalability
RCP-ABE scheme
pubcrawl
policy-based governance
fine-grained attributes
Cryptography
CP-ABE
collaboration
cloud storage environment
Access Control
ciphertext storage
ciphertext sharing
ciphertext policy
ciphertext access control
Big Data
authorisation
attribute revocation
attribute revocable CP-ABE scheme
attribute encryption scheme CP-ABE
attribute encryption
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »