Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data owners
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
security of data
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
Resiliency
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
medical information systems
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
data miners
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
biblio
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption
Submitted by aekwall on Mon, 11/16/2020 - 12:10pm
Cloud Computing
Servers
Cryptography
data owners
encryption
data privacy
data integrity
Resiliency
pubcrawl
composability
Metrics
query processing
Databases
Probabilistic logic
database management systems
security protection
outsourcing
database outsourcing
database service providers
Outsourced Database
Outsourced Database Integrity
business owners
data completeness protecting scheme
data confidentiality protection aspect
data correctness
data integrity protection aspect
high communication
OPE encrypted
ORDER BY
order-preserving encryption
outsourced data secure
query completeness
range queries
widely used encryption scheme
biblio
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
Cloud Computing
Scalability
authorisation
Cryptography
data owners
encryption
Access Control
data privacy
Internet of Things
Resiliency
pubcrawl
blockchain
Data Transmission
outsourcing
smart contract
fine-grained access control
IoT environments
data management
cloud repositories
data users
fine-grain access control system
key-policy attribute-based encryption (KP-ABE)
outsourced cloud data
secured fine-grained selective access
Key Policy Attribute Based Encryption (KP-ABE)
KP-ABE
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
Scalability
Servers
data owners
Big Data
data privacy
security
Protocols
Data models
Resiliency
pubcrawl
privacy
Metrics
query processing
Security analysis
Human Factors
privacy protection
Access Control
Data Security
big data environment
big data platform
complexity analysis
data privacy protection model
experimental data
Massive Data
potential value
query mode design
query privacy protection model
query protocol design
stand-alone simulation experiment
technology protection
big data privacy
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 1:35pm
Cryptography
authorisation
pubcrawl
matrix algebra
Mathematical model
data privacy
Cloud Computing
Security analysis
Metrics
Measurement
nearest neighbour methods
security property
data storage
search problems
k-nearest neighbor search
nearest neighbor search
authorized data users
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
k-NN search schemes
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
biblio
Measuring data privacy preserving and machine learning
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
Computational modeling
data owners
data privacy
data privacy-preserving
data publisher
data publishing
learning (artificial intelligence)
machine learning
machine learning models
machine learning techniques
Measurement
Metrics
Organizations
privacy
privacy levels
privacy measurement
privacy models and measurement
Privacy Preferences
privacy preservation metric
privacy violations
Privacy-preserving
pubcrawl
sensitive data
Software
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 10:47am
IoT
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
Human behavior
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
active bundles
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
policy enforcement
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
Cloud Computing
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cipher-text-policy attribute-based encryption (CP-ABE)
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
data owners
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
storage server
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
A blockchain-based data usage auditing architecture with enhanced privacy and availability
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
auditable contracts
authorisation
authorization
blockchain infrastructures
blockchain-based data usage auditing architecture
composability
contracts
Cryptography
data access
data owners
data privacy
data sharing
data usage compliance
distributed infrastructures
hierarchical identity based cryptographic mechanisms
Metrics
network accountability
Peer-to-peer computing
privacy-preserving fashion
Proposals
pubcrawl
resilience
Resiliency
security breaches
tamper-proof evidences
unauthorized users
untrusted servers
biblio
A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-Keyword Ranked Search
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Amazon EC2 cloud server
cloud
Cloud Computing
composability
computational overhead
Cryptography
data owners
data privacy
data users
dynamic
dynamic operation
dynamic searchable encryption scheme
encryption
Human behavior
Indexes
Metrics
multi-keyword
multikeyword
outsourcing
pubcrawl
query processing
ranked search
resilience
Resiliency
resource pooling
search problems
Secure
secure cloud server operation
Secure File Sharing
secure technique
sensitive data
Servers
TF × IDF model
update
update operation
1
2
next ›
last »