Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud service providers
biblio
Security Analysis for Virtual Machine Allocation in Cloud Computing
Submitted by grigby1 on Fri, 02/17/2023 - 4:19pm
Cloud Computing
security
pubcrawl
Metrics
resilience
Resiliency
Virtual machining
Virtualization
Virtual machine monitors
Compositionality
cloud service providers
Trusted Computing
Memory
Behavioral sciences
Scientific Computing Security
biblio
Data Obfuscation Technique in Cloud Security
Submitted by grigby1 on Mon, 04/18/2022 - 10:37am
cloud computing security
Cloud Security
cloud service providers
cloud storage
Data models
Data Security
Memory
MONcrypt
obfuscation
outsourcing
protocol
Protocols
pubcrawl
Scalability
security scalability
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 2:04pm
cloud computing environment
zero trust
Zero Trust Strategy
Trust Management System
trust management mechanisms
Subjective Trust
static trust relationship
Objective Trust
Incipient Technology
conceptual zero trust strategy
Data Breach
cloud service providers
Trusted Computing
Cloud Computing
Scalability
data integrity
data privacy
data confidentiality
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 8:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
genetic algorithm
security scalability
security risk
security of data
Security Metrics
Scalability
risk management
resource provisioning
quantitative security risk evaluation approach
pubcrawl
InterCloud
Artificial Bee Colony
evolutionary computation
customers security requirements
Compositionality
cloud service providers
cloud security risk-aware resource provisioning scheme
cloud data centers
cloud computing technology
cloud computing infrastructure
cloud computing environment
Cloud Computing
1
2
next ›
last »