Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cloud service provider
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by
grigby1
on Thu, 09/26/2019 - 9:43am
Cloud Computing
Access Control
cloud storage
Safety
resilience
pubcrawl
Human behavior
Metrics
Resiliency
composability
Security analysis
encryption
blockchain
Cryptography
authorisation
cloud service provider
Data Security
Human Factors
cloud server
blockchain technology
Peer-to-peer computing
data integrity
outsourcing
Distributed databases
blockchain-based secure cloud file sharing scheme
blockchains
ciphertext-policy attribute based encryption
CP-ABE
decentralized safety administration
fine-grained data access control
outsourcing data
Secure File Sharing
biblio
Detecting DDoS Attack in Cloud Computing Using Local Outlier Factors
Submitted by
grigby1
on Mon, 01/21/2019 - 11:18am
authentication
authorization
Availability
basic integrity
Cloud Computing
cloud computing environment
cloud service provider
composability
Computer crime
computer network security
Conferences
confidentiality
data storage
DDoS attack detection
Dimensional Reasoning
distributed denial of service attack
DR-LOF
higher detection rates
Human behavior
Intrusion Detection
local outlier factors
lower false alarm rate
Metrics
privacy
pubcrawl
Resiliency
Symbolic Aggregate Approximation
Training
virtual machine security
virtual machines
Virtual machining
virtualisation
virtualization privacy
virtualization technique
WEKA
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by
grigby1
on Wed, 09/05/2018 - 9:39am
client data
Cloud Computing
cloud databases
cloud service provider
Cloudcomputing
Complexity theory
Computing Theory
Concurrency
Cryptography
cryptosystem
data confidentiality
data privacy
data storage
Database as a service
database management systems
Databases
encryption
encryption techniques
high privacy data service
Human behavior
human factor
metadata
privacy
pubcrawl
resilience
Resiliency
Safety
Scalability
secrecy
storage services
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by
grigby1
on Mon, 04/02/2018 - 11:33am
AES cryptography technique
APIs
application program interfaces
authentication
authorisation
biometric authentication system
biometric image
biometric system
biometrics (access control)
Cloud Computing
Cloud Security
cloud service provider
cloud services
Compositionality
distributed system
encryption
enterprise application base
Face
face biometric
face images
face recognition
Microsoft cognitive face API
Microsoft cognitive face-API
Microsoft Windows (operating systems)
multiple biometric information
pubcrawl
public key cryptography
registered user information
resilience
Resiliency
security aspects
Symmetric Key Cryptography
biblio
Secure Cloud Storage and File Sharing
Submitted by
grigby1
on Mon, 03/19/2018 - 12:35pm
Access Control
Cloud Computing
cloud service provider
cloud storage service providers
complex techniques
composability
computing resources
confidentiality
Cryptography
data integrity
data maintenance
DIP
disintegration protocol
elastic data-storage services
encryption
encryption key
enormous volumes
Fingerprint recognition
Human behavior
Metrics
native machines
online cloud services
pubcrawl
re-encryption
resilience
Resiliency
seamless file sharing technique
secure cloud storage
secure data-storage services
Secure File Sharing
secure file sharing mechanism
security
security failure rates
security risks
security tools
Servers
sophisticated techniques
storage management
storage necessities
storage space
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by
grigby1
on Tue, 02/06/2018 - 12:44pm
Big Data
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
CloudBeh model
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
Metrics
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
security
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by
BrandonB
on Wed, 05/06/2015 - 1:11pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by
BrandonB
on Wed, 05/06/2015 - 12:40pm
applications
Cloud Computing
cloud computing paradigm
cloud data storage
cloud scenarios
cloud service provider
Communities
Cryptography
Data Security
decryption key management
encryption key management
key management
Memory
onsite cloud
Organizations
outsourced cloud
potential intruders
public cloud
Public key
sensitive information protection
Servers
storage management
symmetric key
symmetric key cryptography algorithms
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by
BrandonB
on Wed, 05/06/2015 - 9:30am
botcloud activity
botcloud detection
botcoud behavior
botnets
Cloud Computing
cloud service provider
collaboration
Computer crime
computer network security
distributed massive attacks
distributed processing
distributed system behavior analysis
factorial space
Intrusion Detection
legitimate activity
legitimate usage
malicious use
Measurement
Monitoring
principal component analysis
source-based detection
system metrics
system-based detection
transport protocols
UDP-flood DDoS attacks
biblio
Self-establishing a Service Level Agreement within autonomic cloud networking environment
Submitted by
BrandonB
on Wed, 05/06/2015 - 8:58am
autonomic cloud managers
autonomic cloud networking environment
Availability
Bandwidth
Cloud Computing
cloud computing research communities
cloud service provider
cloud service user
computer architecture
contracts
CSP
IaaS services
NaaS services
QoS
quality of service
security
Service Level Agreement
SLA
1
2
next ›
last »