Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
biblio
PTAD:Provable and Traceable Assured Deletion in Cloud Storage
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
incomplete deletion
verification stage
unlinking stage
traceable
storage management
Scalability
pubcrawl
PTAD scheme
PTAD
provable and traceable assured deletion
provable
privacy
overwriting stage
assured deletion
Hyper-ledger Fabric
formal verification
efficient deletion method
Distributed databases
design algorithms
deleted data
data integrity checking
data integrity
data deletion
cloud storage
Cloud Computing
chaincode
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Optimization of Hardware-oblivious and Hardware-conscious Hash-join Algorithms on KNL
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
hardware-oblivious hash join algorithms
hash algorithms
parallel computing
multithreading
multicore servers
memory allocation
manycore platforms
KNL hardware characteristics
Knights Landing
hash join
Resiliency
hardware-conscious hash join algorithms
hardware architecture features
algorithm optimization
multi-threading
multiprocessing systems
Compositionality
storage management
parallel processing
pubcrawl
biblio
Proving Erasure
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
privacy amplification.
users
storage management
Servers
server hosting data
Scalability
Resiliency
resilience
remote hosting service
remote data storage
Quantum mechanics
quantum cryptography
pubcrawl
provable deletion
Protocols
privacy delegation
data deletion
policy-based governance
Metrics
information-theoretically
information-theoretic security
information theoretic security
Human Factors
Human behavior
encryption
eavesdropping
definite deletion
data storage
data privacy
Cryptography
BB84-like protocol
biblio
ChainFS: Blockchain-Secured Cloud Storage
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
forking attacks
trusted Blockchain
storage management
Servers
security of data
Resiliency
resilience
Public key
pubcrawl
policy-based governance
middleware system
middleware security
middleware
History
Fuses
Amazon S3 cloud storage
fork consistency
file-system interface
file system
file operation logging
composability
cloud-storage security
cloud storage services
cloud storage
Cloud Security
Cloud Computing
ChainFS middleware
ChainFS data file storage
blockchain-secured cloud storage
blockchain
biblio
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
Scalability
named data networking
NDN
network applications
poisoning cache attack
privacy violation
pubcrawl
resilience
Resiliency
Named Data Network Security
security susceptibilities
storage management
telecommunication network routing
VANETs
vehicular
vehicular ad hoc networks
Vehicular Named Data Network
VNDN
ICN
CCN
computer network security
content distribution
conventional IP based system
data fetching
data privacy
Flooding
Human behavior
Ad Hoc
IFAMS scheme
Information Centric Network
Interest
interest flooding attack mitigation scheme
internet
IP based Internet
IP networks
mobility management
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »