Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
Research on Storage Mechanism of Cloud Security Policy
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
cloud security policy
Security Policies Analysis
XML
storage mechanism
security policy
Secure storage
popular policy repositories
policy storage technology
policy repository
policy information
Key Words: Cloud Computing
Formal concept analysis
security of data
cloud computing security
storage management
Cloud Security
relational databases
Lattices
testing
policy-based governance
pubcrawl
cloud storage
Cloud Computing
biblio
A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
secret sharing
potential alternative
pubcrawl
public cloud data storage services
public cloud storage
public cloud storage service
Rabin's IDA output files
resilience
Resiliency
seamless secret sharing scheme implementation
Secret key
original file
Secure File Sharing
securing data
security
Servers
Shamir's SSA
short term
storage management
targeted file
targeting ordinary nontechnical users
Human behavior
Cloud Computing
Complexity theory
composability
Cryptography
data privacy
data security concern
defined public cloud storage services
defined service providers
file protection
free plans
authentication key
Human Factors
information dispersal
internet
local secure key-store
low-cost digital data
metadata
Metrics
nontechnical user
Organizations
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
ciphertexts
searchable encryption
searchable symmetric encryption
searchable encryptions
queried keyword
matrix-type storage
matrix-type data format
matrix-type data
location-based search
Keyword search
IoT technologies
encrypted domain
encrypted documents
data outsourcing
cloud storages
resilience
Block Cipher
advanced searchable encryption
outsourcing
personal information
Ciphers
information retrieval
storage management
query processing
Cryptography
Servers
Indexes
composability
Resiliency
pubcrawl
biblio
A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
file content
wildcard SE construction
storage management
security proxy
searchable encryption
Resiliency
resilience
pubcrawl
potential storage solution
on-premises storage
local malicious staff
local index
information retrieval
Indexes
index database
Amazon S3
enterprises
encryption
efficient wildcard searchable encryption
efficient encryption
database indexing
Cryptography
constantly small storage footprint
composability
cloud storage backends
cloud storage
cloud databases
Cloud Computing
Buildings
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Increase Capacity of QR Code Using Compression Technique
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
error correction codes
storage management
smart cities
RGB color technique
Resiliency
QR–Code
QR codes
QR code decoder application
pubcrawl
Multi color QR code
Memory
Libraries
Image color analysis
bank data processing
encoding
e-wallet companies
demonetization step
Decoding
data storage capacity
data compression
cyber physical systems
Cryptography
compression technique
cashless society
barcode
Bar codes
biblio
Using a Robust Metadata Management System to Accelerate Scientific Discovery at Extreme Scales
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
-EMPRESS
Metadata Discovery Problem
software fault tolerance
scientific discovery
scale-up scientific applications
query functionality
Production systems
metadata management system
Fault tolerant systems
EMPRESS 2.0
EMPRESS 1.0
custom-metadata
atomic operations
Acceleration
-SIRIUS
Scalability
-descriptive-metadata
-Decaf
-data-tagging
-ATDM
storage management
meta data
fault tolerance
Analytical models
metadata
query processing
Computational modeling
composability
pubcrawl
Resiliency
biblio
Intelligent monitoring of indoor surveillance video based on deep learning
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Streaming media
protection system
pubcrawl
recurrent neural nets
Resiliency
Scalability
Semantics
smart monitoring system
storage management
pose estimation
surveillance
surveillance cameras
Surveillance video
Training
video image
video signal processing
video surveillance
video surveillance system
indoor surveillance video
convolutional neural nets
deep learning
deep learning methods
deep video
fine-tuning network
high-quality segmentation mask
image retrieval
image segmentation
Cameras
information technology
Instance Segmentation
intelligent monitoring
intelligent video analytics technology
learning (artificial intelligence)
Mask R-CNN
Metrics
object detection
biblio
Secure Proof of Retrievability System in Cloud for Data Integrity
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
security model
Generators
integrity verification
Metrics
proof of retrievability
pubcrawl
resilience
Resiliency
retrievability system
file upload phase
security of data
Servers
SHA-S12
storage management
tag generation
third party auditor
Third Party Auditor (TPA)
AES encryption
encryption audits
encryption
Databases
data storage
data integrity
Cryptography
computational cost
Compositionality
Cloud storage (CST)
cloud service controller
Cloud Controller (CSC)
Cloud Computing
Cloud Auditing
Ciphers
Application software
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »