Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cloud service providers
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
security of data
Cloud Computing
Servers
security
History
Trusted Computing
pubcrawl
Computational modeling
Mathematical model
Fuzzy logic
Cloud Security
Human Factors
User behavior
cloud service providers
trust evaluation
Human behavior
cloud computing infrastructure
could computing
fuzzy login
trust computation center
user behavior trust model based on fuzzy logic
user behavior trust modeling
user history patterns
user trust value
human trust
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
Cloud Computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Peer-to-peer computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
pubcrawl
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
cloud data transmission
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
big data security
Big Data
big data encryption
big dataset clustering
Cloud Computing
cloud provider
cloud service providers
cloud-based solutions
Cryptography
data control
data privacy
data structures
edge computing
Encrypted Clustering
encryption
markov chain
Metrics
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
sensitive data
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 8:56am
Cloud Computing
Scalability
Cryptography
cloud storage
Internet of Things
smart devices
Resiliency
Human behavior
pubcrawl
policy-based governance
data aggregation
Metrics
storage management
cryptology
secure environment
aggregate data
cloud service provider
cloud service providers
cloud-based IoTs
information architecture
Internet of Things (IoTs)
IoTs applications
scalable mass storage systems
secret sharing scheme
secret sharing-based storage system
secure mass storage systems
threshold secret sharing scheme
biblio
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
Artificial Bee Colony
Cloud Computing
cloud computing environment
cloud computing infrastructure
cloud computing technology
cloud data centers
cloud security risk-aware resource provisioning scheme
cloud service providers
Compositionality
customers security requirements
evolutionary computation
genetic algorithm
InterCloud
pubcrawl
quantitative security risk evaluation approach
resource provisioning
risk management
Scalability
Security Metrics
security of data
security risk
security scalability
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 11:33am
Analytical models
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
composability
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
policy-based governance
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
Scalability
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
Cloud Computing
cloud computing paradigm
cloud computing technology
cloud provider
cloud service providers
completely secure migration
confidentiality
Cryptography
data center
DNA
DNA cryptography
encoding
encryption
Human behavior
integrity
intensive data computing
Internet service
Metrics
outsourcing
privacy
private data
protection
pubcrawl
resilience
Resiliency
secured outsourcing
security
security schema
security solution
storage
trust
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 10:30am
advanced encryption standard algorithm
Amazon EC2 cloud
auditing
Cloud Computing
cloud data
cloud data security
cloud service providers
Compositionality
Cryptography
data confidentiality
data integrity
data privacy
data storing
encryption
encryption audits
metadata
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
secure auditing system
secure hash algorithm
security issues
Servers
storage management
third party auditor
windows server instance
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 4:05pm
Cloud Computing
cloud environments
cloud federation
Cloud federation formation model
Cloud federation formation process
Cloud federations
Cloud Security
cloud service providers
coalitional game
Computational modeling
cooperative game
federated Cloud service
federation formation algorithm
game theoretic security
game theory
Games
hedonic coalitional game
Human Factors
insecure CSPs
Metrics
online Cloud federation formation
pubcrawl
quality of service
risk management
Scalability
security
security of data
security risk assessment
security risk avoidance
security risk levels
undesirable CSPs
1
2
next ›
last »