Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
service provider
biblio
An Efficient Key Agreement Protocol for Smart Grid communication
Submitted by grigby1 on Fri, 01/20/2023 - 3:59pm
pubcrawl
Metrics
Resiliency
privacy
Protocols
Smart Grid
smart meters
Smart Grids
energy consumption
Resists
key agreement
Elliptic curve cryptography
Lead
service provider
smart meter
Smart Grid Privacy
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 1:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Data Caching Optimization in the Edge Computing Environment
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
mobile users
information retrieval
Integer Problem (IP)
integer programming
integer programming problem
Metrics
mobile computing
mobile data traffic
mobile devices
Energy Efficiency
network delay reduction
Page-Hinckley-Test (PHT)
resilience
Resiliency
Scalability
service provider
Web Caching
pubcrawl
edge servers
edge computing environment
edge computing
delays
data popularity
data optimization
data handling
data caching problem
data caching optimization
data cache problem
data access latency
data access
Cloud Computing
centralized cloud
cache storage
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
Numerical models
user-defender-attacker game
two-player model
two-player game model
two-layer three-player game framework
service provider
secure privacy-preserving protocols
Scalability
Resiliency
resilience
pubcrawl
private information
privacy
computer science
Internet of Things
human factor
Human behavior
hierarchical game framework
Games
game theory
data privacy preservation
data privacy
Data models
context-aware IoT applications
context-aware Internet
Computing Theory
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
1
2
next ›
last »