Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
private data
biblio
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Submitted by
aekwall
on Mon, 11/11/2019 - 10:47am
Cloud Computing
Scalability
Cryptography
encryption
data privacy
learning (artificial intelligence)
machine learning
Human behavior
pubcrawl
privacy
attribute-based encryption
client policy
data contributor
drugs
evaluator policy
genetic epidemiology
Genetics
Homomorphic encryption
hospitals
OPFE-PPE
outsourced private function evaluation
outsourcing
personalized medication
Policy Oblivious Encryption
Privacy Policies
privacy policy enforcement
private data
Private Function Evaluation
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by
grigby1
on Thu, 02/14/2019 - 10:20am
data privacy
Internet of Things
Temperature measurement
pubcrawl
Metrics
composability
sensors
computer network security
middleware
taint analysis
data flows
authorisation
private data
Access Control
Semantics
usage control
data flow control
data-centric security policy framework
distributed systems
Industrial Internet of Things
Information Flow Control
information leaks
IoT applications
LUCON policies
message routes
message-based IoT systems
personal information
policy enforcement
process control
real-world IoT middleware
Runtime
usage control mechanisms
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by
grigby1
on Mon, 01/21/2019 - 11:17am
ARM hardware virtualization technique
ARM Hypervisor
composability
data privacy
embedded systems
H-Securebox system
hardened memory data protection framework
Hardware
Human behavior
hypervisor privilege
Internet of Things
IoT devices
Kernel
kernel level attack
kernel privilege
kernel-level memory data
low power consumption
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
security
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by
grigby1
on Mon, 03/26/2018 - 11:58am
antivirus software
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
Kali Linux
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
prevention techniques
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
software programs
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
biblio
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption
Submitted by
grigby1
on Thu, 02/15/2018 - 10:39am
AI
Artificial Intelligence
computer vision
Cryptography
data privacy
Distributed databases
doubly permuted homomorphic encryption
encryption
high-dimensional data
homomorphic cryptosystem
Human behavior
human factor
Human Factors
Image Processing
learning (artificial intelligence)
learning procedure
leveraging distributed private image data
multiple classifiers
novel efficient encryption scheme
privacy
privacy-preserving framework
privacy-preserving methods
privacy-preserving visual learning
private data
private information
pubcrawl
resilience
Resiliency
Scalability
sparse data
Videos
visual classifiers
visual recognition methods
visualization
biblio
Enhance Privacy in Big Data and Cloud via Diff-Anonym Algorithm
Submitted by
grigby1
on Tue, 02/06/2018 - 12:42pm
accurate data
Big Data
big data privacy
cloud
Cloud Computing
Computers
data anonymity
Data models
data privacy
diff-anonym algorithm
differential privacy
Human Factors
Influenza
k-anonymity
Metrics
Policy
privacy
privacy assurance
privacy enhancement
privacy guarantee rate
privacy infringement
privacy models
private data
pubcrawl
Resiliency
Scalability