Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cloud service providers
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by
grigby1
on Mon, 08/05/2019 - 10:30am
advanced encryption standard algorithm
Amazon EC2 cloud
auditing
Cloud Computing
cloud data
cloud data security
cloud service providers
Compositionality
Cryptography
data confidentiality
data integrity
data privacy
data storing
encryption
encryption audits
metadata
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
secure auditing system
secure hash algorithm
security issues
Servers
storage management
third party auditor
windows server instance
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by
grigby1
on Fri, 10/26/2018 - 4:05pm
Cloud Computing
cloud environments
cloud federation
Cloud federation formation model
Cloud federation formation process
Cloud federations
Cloud Security
cloud service providers
coalitional game
Computational modeling
cooperative game
federated Cloud service
federation formation algorithm
game theoretic security
game theory
Games
hedonic coalitional game
Human Factors
insecure CSPs
Metrics
online Cloud federation formation
pubcrawl
quality of service
risk management
Scalability
security
security of data
security risk assessment
security risk avoidance
security risk levels
undesirable CSPs
biblio
Cloud security ecosystem for data security and privacy
Submitted by
grigby1
on Thu, 02/15/2018 - 10:49am
resilience
pubcrawl
Resiliency
Human behavior
Human Factors
Cryptography
data privacy
encryption
Cloud Computing
authentication
cloud service providers
Data Security
Ecosystems
Metrics
human factor
CSP
Cloud Security
multifactor authentication
cloud adoption
cloud security ecosystem
CloudSim
CloudSim simulator
HCS
hybrid cryptographic system
IT industry
biblio
Build Trust in the Cloud Computing - Isolation in Container Based Virtualisation
Submitted by
grigby1
on Fri, 11/03/2017 - 10:31am
Access Control
authorisation
Cloud Computing
cloud service providers
cloud users
container based virtualisation
Container isolation
container protection
Containers
Data protection
Data Security
isolation benchmarking
isolation benchmarking tools
IT ecosystems
Kernel
pubcrawl
RBAC
RBAC model
role-based access control model
Scalability
scalable computing resources
Scalable Security
security system
stress test
trust layer
trust relationship
Trusted Computing
virtual machines
Virtual machining
virtualisation
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by
grigby1
on Mon, 02/27/2017 - 11:54am
AHP
AHP model
analytic hierarchy process
Cloud Computing
cloud computing services
cloud service providers
data privacy
estimation
Fuzzy
fuzzy based mechanism
fuzzy set theory
heterogeneous cloud infrastructure
hierarchical trust model
infrastructure as a service
Measurement
pubcrawl170107
security
Time factors
trust evaluation
Trusted Computing
biblio
Surveing the challenges and requirements for identity in the cloud
Submitted by
BrandonB
on Wed, 05/06/2015 - 12:28pm
security
SaaS
Organizations
Identity provider
hybrid clouds
Federation provider
federated identity management
Federated identity
data centers
computing resource sharing
Computers
user identity federation
Token
security of data
Computational modeling
cloud technologies
cloud service providers
Cloud Computing
cloud
Claim
business organizations
authentication
Access Control
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by
BrandonB
on Mon, 05/04/2015 - 1:50pm
authentication
authorisation
authorization and accounting
Availability
Browsers
cloud based applications
cloud based services
Cloud Computing
Cloud Security
cloud service providers
cloud system architecture
Computational modeling
diameter AAA mechanisms
Diameter-AAA
internet
Protocols
security management
Servers
Web based applications
biblio
Memory Trace Oblivious Program Execution
Submitted by
Heather Lucas
on Wed, 09/17/2014 - 5:46pm
arrays
Cloud Computing
cloud service providers
cold-boot style attacks
compiler
computing infrastructure
computing platform
Cryptography
DRAM chips
encryption
formal security
memory access overhead
memory access traces
memory trace oblivious program execution
Oblivious RAM
optimal efficiency
ORAM banks
physical access
physical attacks
physical control
probing memory buses
program compilers
program diagnostics
program verification
programming language techniques
Random access memory
Semantics
type system
variable partitioning