Twenty security considerations for cloud-supported Internet of Things J Singh, T Pasquier, J Bacon, H Ko, D Eyers Internet of Things Journal, 2016 | 432 | 2016 |
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats X Han, T Pasquier, A Bates, J Mickens, M Seltzer Network and Distributed Systems Security (NDSS'20) Symposium, 2020 | 247 | 2020 |
Information flow control for secure cloud computing J Bacon, D Eyers, T Pasquier, J Singh, I Papagiannis, P Pietzuch Network and Service Management, IEEE Transactions on 11 (1), 76-89, 2014 | 173 | 2014 |
Practical Whole-System Provenance Capture T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon ACM Symposium on Cloud Computing (SoCC'17), 405-418, 2017 | 171 | 2017 |
CamFlow: Managed Data-sharing for Cloud Services T Pasquier, J Singh, D Eyers, J Bacon Transactions on Cloud Computing, 2015 | 111 | 2015 |
Runtime Analysis of Whole-System Provenance T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ... Conference on Computer and Communications Security (CCS’18), 2018 | 102 | 2018 |
Data provenance to audit compliance with privacy policy in the Internet of Things T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon Personal and Ubiquitous Computing 22 (2), 333–344, 2018 | 96 | 2018 |
A large-scale study on research code quality and execution A Trisovic, MK Lau, T Pasquier, M Crosas Scientific Data 9 (1), 60, 2022 | 71 | 2022 |
Data flow management and compliance in cloud computing J Singh, JE Powles, T Pasquier, JM Bacon IEEE Cloud Computing, 2015 | 63 | 2015 |
If these data could talk T Pasquier, MK Lau, A Trisovic, ER Boose, B Couturier, M Crosas, ... Nature Scientific Data 4, 2017 | 54 | 2017 |
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer Workshop on Hot Topics in Cloud Computing (HotCloud'17), 2017 | 54 | 2017 |
Provenance-based Intrusion Detection: Opportunities and Challenges X Han, T Pasquier, M Seltzer USENIX Workshop on the Theory and Practice of Provenance (TaPP), https://www …, 2018 | 52 | 2018 |
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things J Singh, T Pasquier, J Bacon, J Powles, R Diaconu, D Eyers ACM/IFIP/USENIX Middleware, 2016 | 43 | 2016 |
SIGL: Securing Software Installations Through Deep Graph Learning X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen USENIX Security Symposium, 2021 | 40 | 2021 |
To tune or not to tune? in search of optimal configurations for data analytics A Fekry, L Carata, T Pasquier, A Rice, A Hopper Proceedings of the 26th ACM SIGKDD International Conference on Knowledge …, 2020 | 40 | 2020 |
Information Flow Audit for PaaS clouds TFJM Pasquier, J Singh, J Bacon, D Eyers International Conference on Cloud Engineering (IC2E), 2016 | 38 | 2016 |
Expressing and Enforcing Location Requirements in the Cloud using Information Flow Control TFJM Pasquier, J Powles International Workshop on Legal and Technical Issues in Cloud Computing …, 2015 | 33 | 2015 |
Data-Centric Access Control for Cloud Computing T Pasquier, J Bacon, J Singh, D Eyers Symposium on Access Control Models and Technologies (SACMAT'16) 21, 2016 | 29 | 2016 |
Integrating Messaging Middleware and Information Flow Control J Singh, TFJM Pasquier, J Bacon, D Eyers International Conference on Cloud Engineering (IC2E), 54-59, 2015 | 28 | 2015 |
FlowK: Information Flow Control for the Cloud TFJM Pasquier, J Bacon, D Eyers IEEE International Conference on Cloud Computing Technology and Science …, 2014 | 28 | 2014 |