Follow
Thomas Pasquier
Title
Cited by
Cited by
Year
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko, D Eyers
Internet of Things Journal, 2016
3402016
Information flow control for secure cloud computing
J Bacon, D Eyers, T Pasquier, J Singh, I Papagiannis, P Pietzuch
Network and Service Management, IEEE Transactions on 11 (1), 76-89, 2014
1492014
Practical Whole-System Provenance Capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
ACM Symposium on Cloud Computing (SoCC'17), 405-418, 2017
1002017
CamFlow: Managed Data-sharing for Cloud Services
T Pasquier, J Singh, D Eyers, J Bacon
Transactions on Cloud Computing, 2015
802015
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
Network and Distributed Systems Security (NDSS'20) Symposium, 2020
762020
Data provenance to audit compliance with privacy policy in the Internet of Things
T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon
Personal and Ubiquitous Computing 22 (2), 333–344, 2018
722018
Runtime Analysis of Whole-System Provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Conference on Computer and Communications Security (CCS’18), 2018
552018
Data flow management and compliance in cloud computing
J Singh, JE Powles, T Pasquier, JM Bacon
IEEE Cloud Computing, 2015
512015
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
Workshop on Hot Topics in Cloud Computing (HotCloud'17), 2017
382017
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
J Singh, T Pasquier, J Bacon, J Powles, R Diaconu, D Eyers
ACM/IFIP/USENIX Middleware, 2016
372016
If these data could talk
T Pasquier, MK Lau, A Trisovic, ER Boose, B Couturier, M Crosas, ...
Nature Scientific Data 4, 2017
352017
Information Flow Audit for PaaS clouds
TFJM Pasquier, J Singh, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 2016
342016
Expressing and Enforcing Location Requirements in the Cloud using Information Flow Control
TFJM Pasquier, J Powles
International Workshop on Legal and Technical Issues in Cloud Computing …, 2015
312015
Provenance-based Intrusion Detection: Opportunities and Challenges
X Han, T Pasquier, M Seltzer
USENIX Workshop on the Theory and Practice of Provenance (TaPP), https://www …, 2018
302018
Integrating Messaging Middleware and Information Flow Control
J Singh, TFJM Pasquier, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 54-59, 2015
272015
FlowK: Information Flow Control for the Cloud
TFJM Pasquier, J Bacon, D Eyers
IEEE International Conference on Cloud Computing Technology and Science …, 2014
262014
Data-Centric Access Control for Cloud Computing
T Pasquier, J Bacon, J Singh, D Eyers
Symposium on Access Control Models and Technologies (SACMAT'16) 21, 2016
252016
Information Flow Control for Strong Protection with Flexible Sharing in PaaS
TFJM Pasquier, J Singh, J Bacon
International Workshop on Future of PaaS, 2015
222015
Regional clouds: technical considerations
J Singh, J Bacon, J Crowcroft, A Madhavapeddy, TFJM Pasquier, WK Hon, ...
Technical Report (UCAM-CL-TR-863), 2014
212014
FlowR: aspect oriented programming for information flow control in ruby
TFJM Pasquier, J Bacon, B Shand
Proceedings of the of the 13th international conference on Modularity, 37-48, 2014
202014
The system can't perform the operation now. Try again later.
Articles 1–20