Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy
biblio
Protecting User Privacy Based on Secret Sharing with Fault Tolerance for Big Data in Smart Grid
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
Policy
user privacy
telecommunication security
smart power grids
smart meters
Smart Grids
Smart Grid
secret sharing
Scalability
Resiliency
real-time systems
pubcrawl
private key cryptography
Privacy-preserving
power system measurement
Big Data
Metrics
Human Factors
Fault tolerant systems
fault tolerant control
fault tolerance
encryption
dynamic price
data privacy
data aggregation scheme
data aggregation
control center
computerised monitoring
big data privacy
biblio
Big Data Source Location Privacy and Access Control in the Framework of IoT
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
IoT
Servers
security
Scalability
Resiliency
pubcrawl
Protocols
privacy
Policy
mobile devices
Metrics
location
Access Control
Internet of Things
Human Factors
generator objects
encryption
data privacy
Data models
Cryptography
big data source location privacy
big data privacy
Big Data
biblio
A Hybrid Location Privacy Protection Scheme in Big Data Environment
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
Big Data
big data privacy
Correlation
Cryptography
data privacy
Human Factors
Metrics
Mobile radio mobility management
Policy
privacy
pubcrawl
Resiliency
Scalability
Spatiotemporal phenomena
biblio
Weatherman: Exposing Weather-Based Privacy Threats in Big Energy Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
big data privacy
document
format
Human Factors
Metrics
Policy
portable
pubcrawl
Resiliency
Scalability
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
k-anonymity
Scalability
Resiliency
pubcrawl
private data
privacy models
privacy infringement
privacy guarantee rate
privacy enhancement
privacy assurance
privacy
Policy
Metrics
accurate data
Influenza
Human Factors
differential privacy
diff-anonym algorithm
data privacy
Data models
data anonymity
Computers
Cloud Computing
cloud
big data privacy
Big Data
biblio
A policy-based identity management schema for managing accesses in clouds
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Access Control
authentication
Cloud Computing
Computational modeling
Identity management
Policy
Policy Mapping
pubcrawl
Reliability
Scalability
scalable
Scalable Security
security
Servers
user authentication
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Mobile Cloud middleware
web services
Web service governance
security of data
security criteria regulation middleware
security criteria regulation
security
pubcrawl
policy-based governance
Policy Based Governance
Policy
PGP
PDP
Organizations
multicloud tenancies
asset consumer security profiles
middleware
ESB-integrated middleware
cumbersome policy files
computing power
computing functionality
computer architecture
component
complex composite service
colosum scaling property
collaboration
Cloud Computing
attribute-based security policy model
attribute-based security policy
biblio
The Influence of Data Protection and Privacy Frameworks on the Design of Learning Analytics Systems
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Security by Default
collaboration
Data protection
data protection by default
data protection by design
learning analytics
learning analytics process requirements
learning analytics systems design
personal information
Policy
policy-based governance
privacy by design
privacy frameworks
pubcrawl
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »