Thomas Pasquier
Cited by
Cited by
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko, D Eyers
Internet of Things Journal, 2016
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
Network and Distributed Systems Security (NDSS'20) Symposium, 2020
Information flow control for secure cloud computing
J Bacon, D Eyers, T Pasquier, J Singh, I Papagiannis, P Pietzuch
Network and Service Management, IEEE Transactions on 11 (1), 76-89, 2014
Practical Whole-System Provenance Capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
ACM Symposium on Cloud Computing (SoCC'17), 405-418, 2017
CamFlow: Managed Data-sharing for Cloud Services
T Pasquier, J Singh, D Eyers, J Bacon
Transactions on Cloud Computing, 2015
Runtime Analysis of Whole-System Provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Conference on Computer and Communications Security (CCS’18), 2018
Data provenance to audit compliance with privacy policy in the Internet of Things
T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon
Personal and Ubiquitous Computing 22 (2), 333–344, 2018
A large-scale study on research code quality and execution
A Trisovic, MK Lau, T Pasquier, M Crosas
Scientific Data 9 (1), 60, 2022
Data flow management and compliance in cloud computing
J Singh, JE Powles, T Pasquier, JM Bacon
IEEE Cloud Computing, 2015
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
Workshop on Hot Topics in Cloud Computing (HotCloud'17), 2017
Provenance-based Intrusion Detection: Opportunities and Challenges
X Han, T Pasquier, M Seltzer
USENIX Workshop on the Theory and Practice of Provenance (TaPP), https://www …, 2018
If these data could talk
T Pasquier, MK Lau, A Trisovic, ER Boose, B Couturier, M Crosas, ...
Nature Scientific Data 4, 2017
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
J Singh, T Pasquier, J Bacon, J Powles, R Diaconu, D Eyers
ACM/IFIP/USENIX Middleware, 2016
To tune or not to tune? in search of optimal configurations for data analytics
A Fekry, L Carata, T Pasquier, A Rice, A Hopper
Proceedings of the 26th ACM SIGKDD International Conference on Knowledge …, 2020
SIGL: Securing Software Installations Through Deep Graph Learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
USENIX Security Symposium, 2021
Information Flow Audit for PaaS clouds
TFJM Pasquier, J Singh, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 2016
Expressing and Enforcing Location Requirements in the Cloud using Information Flow Control
TFJM Pasquier, J Powles
International Workshop on Legal and Technical Issues in Cloud Computing …, 2015
Integrating Messaging Middleware and Information Flow Control
J Singh, TFJM Pasquier, J Bacon, D Eyers
International Conference on Cloud Engineering (IC2E), 54-59, 2015
Data-Centric Access Control for Cloud Computing
T Pasquier, J Bacon, J Singh, D Eyers
Symposium on Access Control Models and Technologies (SACMAT'16) 21, 2016
FlowK: Information Flow Control for the Cloud
TFJM Pasquier, J Bacon, D Eyers
IEEE International Conference on Cloud Computing Technology and Science …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20