Thomas Pasquier
Thomas Pasquier
Lecturer/Assistant Professor, University of Bristol
Bestätigte E-Mail-Adresse bei bristol.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko, D Eyers
Internet of Things Journal, 2016
2422016
Information flow control for secure cloud computing
J Bacon, D Eyers, TFJM Pasquier, J Singh, I Papagiannis, P Pietzuch
Network and Service Management, IEEE Transactions on 11 (1), 76-89, 2014
1172014
Practical Whole-System Provenance Capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
ACM Symposium on Cloud Computing (SoCC'17), 405-418, 2017
452017
CamFlow: Managed Data-sharing for Cloud Services
T Pasquier, J Singh, D Eyers, J Bacon
Transactions on Cloud Computing, 2015
432015
Data flow management and compliance in cloud computing
J Singh, JE Powles, T Pasquier, JM Bacon
IEEE Cloud Computing, 2015
362015
Data provenance to audit compliance with privacy policy in the Internet of Things
T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon
Personal and Ubiquitous Computing 22 (2), 333–344, 2018
352018
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
J Singh, T Pasquier, J Bacon, J Powles, R Diaconu, D Eyers
ACM/IFIP/USENIX Middleware, 2016
292016
If these data could talk
T Pasquier, MK Lau, A Trisovic, ER Boose, B Couturier, M Crosas, ...
Nature Scientific data 4, 2017
272017
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
Workshop on Hot Topics in Cloud Computing (HotCloud'17), 2017
262017
Information Flow Audit for PaaS clouds
TFJM Pasquier, J Singh, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 2016
252016
Expressing and Enforcing Location Requirements in the Cloud using Information Flow Control
TFJM Pasquier, J Powles
International Workshop on Legal and Technical Issues in Cloud Computing …, 2015
232015
Runtime Analysis of Whole-System Provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Conference on Computer and Communications Security (CCS’18), 2018
222018
Data-Centric Access Control for Cloud Computing
T Pasquier, J Bacon, J Singh, D Eyers
Symposium on Access Control Models and Technologies (SACMAT'16) 21, 2016
222016
Integrating Messaging Middleware and Information Flow Control
J Singh, TFJM Pasquier, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 54-59, 2015
222015
Regional clouds: technical considerations
J Singh, J Bacon, J Crowcroft, A Madhavapeddy, TFJM Pasquier, WK Hon, ...
Technical Report (UCAM-CL-TR-863), 2014
212014
FlowK: Information Flow Control for the Cloud
TFJM Pasquier, J Bacon, D Eyers
IEEE International Conference on Cloud Computing Technology and Science …, 2014
182014
Information Flow Control for Strong Protection with Flexible Sharing in PaaS
TFJM Pasquier, J Singh, J Bacon
International Workshop on Future of PaaS, 2015
172015
FlowR: aspect oriented programming for information flow control in ruby
TFJM Pasquier, J Bacon, B Shand
Proceedings of the of the 13th international conference on Modularity, 37-48, 2014
162014
Provenance-based Intrusion Detection: Opportunities and Challenges
X Han, T Pasquier, M Seltzer
USENIX Workshop on the Theory and Practice of Provenance (TaPP), https://www …, 2018
152018
Securing Tags to Control Information Flows within the Internet of Things
J Singh, TFJM Pasquier, J Bacon
First International Conference on Recent Advances in Internet of Things …, 2015
152015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20