Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
service providers
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
resilience
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
medical treatment process
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
HIPAA
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
Accountability Solution
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 10:56am
ring signature
Computing Theory and Privacy
wearable smart sensing devices
user identifier
stealth address
smart sensing area
smart sensing
privacy-user-friendly scheme
personal data privacy
Intelligent sensors
blockchain based scheme
wearable computers
user experience
Scalability
privacy protection
sensors
human computer interaction
Public key
service providers
blockchain
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 9:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
cloud environment
user privacy in the cloud
user attributes protection
SPs
Services and user’s privacy
pseudonymous technique
pseudoattributes values
privacy token technique
Privacy Token
personal identifiable information
Java programming language
federated identity management system
CloudAnalyst simulation
attributes privacy protection
Cloud Computing
privacy risks
Scalability
cloud
Java
service providers
risk management
Data protection
Metrics
privacy
pubcrawl
Resiliency
authorisation
biblio
Adapting Users' Privacy Preferences in Smart Environments
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
Internet of Things
privacy
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
data privacy
Scalability
service providers
Privacy Policies
privacy checking
Privacy Control
Privacy Preferences
smart environment
soft privacy matching mechanism
users privacy preferences
1
2
next ›
last »