Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data confidentiality
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 2:04pm
Trusted Computing
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
data confidentiality
data privacy
data integrity
Scalability
Cloud Computing
cloud computing environment
cloud service providers
Data Breach
conceptual zero trust strategy
Incipient Technology
Objective Trust
static trust relationship
Subjective Trust
trust management mechanisms
Trust Management System
Zero Trust Strategy
zero trust
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
Cloud Computing
composability
corporate cloud storage environment
cyber physical systems
data confidentiality
data privacy
efficient encryption
encrypted data
encryption
Keyword search
keyword search scheme
network storage service
NPEKS
pubcrawl
Public key
public key cryptography
public key encryption
public key encryption algorithm
Public key Encryption with Keyword Search (PEKS)
query formulation
Resiliency
searchable encryption
searchable encryption algorithms
secret retrieval
Servers
storage management
third-party data
third-party server
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
road safety
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
improved security
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
different ECUs
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 10:24am
Elliptic curve cryptography
pubcrawl
Scalability
Resiliency
Metrics
Access Control
access control mechanisms
Attribute authority
authorisation
cipher text policy attribute based encryption
Cloud Computing
Cloud Security
composability
cyber physical systems
data access control scheme
data confidentiality
data privacy
Data Security
data transfer
Diffie Hellman
efficient encryption
encryption
Fuzzy
Fuzzy Cryptography
fuzzy elliptic curve cryptography
fuzzy fined-grained access control
fuzzy set theory
public key cryptography
public key encryption
Receivers
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
attack pattern
attack scenario
attribution
composability
computer network security
cyber attack
cyber attack initiator identification
Cyber Attribution
cyber attribution problem
data availability
data confidentiality
data integrity
Human behavior
individual organization
information system
Metrics
pubcrawl
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Scalability
Access Control
authorisation
Cryptography
data confidentiality
encryption
abe
attribute-based encryption
Internet of Things
data integrity
embedded devices
Human behavior
pubcrawl
policy-based governance
wireless sensor networks
Intelligent sensors
Constrained Devices
actuators
communication overhead
CP-ABE
ABE scheme
ABE techniques
attribute-based scheme
broadcast
ciphertext-policy attribute-based encryption
fABElous
industrial IoT applications
technological vision
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
encryption
pubcrawl
Human behavior
resilience
Resiliency
computer network security
data confidentiality
data privacy
data integrity
internet
Protocols
Databases
composability
Routing
message passing
Metrics
anonymity
MQTT protocol
anonymous communications
Broker Bridging
dynamic broker bridging mechanism
message exchange
MQTT
MQTT-SN
onion routing
security service
smart devices
standard mechanisms
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
Cryptography
encryption
Access Control
authorisation
data privacy
Scalability
Cloud Computing
pubcrawl
policy-based governance
Lattices
CP-ABE
encryption scheme
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Resists
fine-grained access control
bilinear maps
Ciphertext policy attribute-based encryption
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
multiauthority CP-ABE scheme
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 10:05am
Cloud Computing
Cryptography
Data Security
encryption
data privacy
Organizations
Resiliency
pubcrawl
Metrics
Scalability
Ciphers
privacy protection
data confidentiality
data integrity
security model
Access Control
cyberspace data
internet acts
user privacy in the cloud
1
2
3
4
5
next ›
last »