Publications

2017
T. Pasquier, J. Singh, J. Powles, D. Eyers, M. Seltzer, and J. Bacon, “Data provenance to audit compliance with privacy policy in the Internet of Things,” Springer Personal and Ubiquitous Computing, 2017. Publisher's Version main.pdf
T. Pasquier, et al., “Practical Whole-System Provenance Capture,” in Symposium on Cloud Computing (SoCC’17), 2017. socc-2017.pdf
X. Han, T. Pasquier, T. Ranjan, M. Goldstein, and M. Seltzer, “FRAPpuccino: Fault-detection through Runtime Analysis of Provenance,” in Workshop on Hot Topics in Cloud Computing (HotCloud'17), 2017. han-hotcloud-2017.pdf
T. Pasquier, D. Eyers, and J. Bacon, “PHP2Uni: Building Unikernels using Scripting Language Transpilation,” in International Conference on Cloud Engineering (IC2E'17), Vancouver, Canada, 2017. 2017ic2ephp2uni.pdf
2016
J. Singh, T. Pasquier, J. Bacon, R. Diaconu, J. Powles, and D. Eyers, “Big Ideas paper:Policy-driven middleware for a legally-compliant Internet of Things,” in Proceedings 17th ACM/IFIP/Usenix Middleware, 2016. Publisher's Version 2016bipreprint.pdf
T. Pasquier, J. Bacon, J. Singh, and D. Eyers, “Data-Centric Access Control for Cloud Computing,” in Symposium on Access Control Models and Technologies, 2016. 2016sacmat.pdf
T. Pasquier, J. Singh, J. Bacon, and D. Eyers, “Information Flow Audit for PaaS clouds,” in International Conference on Cloud Engineering (IC2E), 2016. 2016ic2e.pdf
T. Pasquier and D. Eyers, “Information Flow Audit for Transparency and Compliance in the Handling of Personal Data,” in IC2E International Workshop on Legal and Technical Issues in Cloud Computing (CLaw'16), 2016. claw2016.pdf
J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security considerations for cloud-supported Internet of Things,” in IEEE Internet of Things Journal, 2016. 2016iotjnl.pdf
2015
T. Pasquier, J. Singh, D. Eyers, and J. Bacon, “CamFlow: Managed Data-Sharing for Cloud Services,” in IEEE Transactions on Cloud Computing, 2015. 2015camflowtcc.pdf
T. Pasquier, J. Singh, and J. Bacon, “Clouds of Things need Information Flow Control with Hardware Roots of Trust,” in International Conference on Cloud Computing Technology and Science (CloudCom'15), 2015. 2015cloudcomposter.pdf
J. Singh, J. Powles, T. Pasquier, and J. Bacon, “Data Flow Management and Compliance in Cloud Computing,” in IEEE Cloud Computing Magazine, 2015. 2015cloudmagazine.pdf
T. Pasquier and J. Powles, “Expressing and Enforcing Location Requirements in the Cloud using Information Flow Control,” in IC2E International Workshop on Legal and Technical Issues in Cloud Computing (CLaw'15), 2015. 2015claw.pdf
T. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for Strong Protection with Flexible Sharing in PaaS,” in IC2E, International Workshop on Future of PaaS, 2015. 2015fpaas.pdf
J. Singh, T. Pasquier, J. Bacon, and D. Eyers, “Integrating Middleware with Information Flow Control,” in International Conference on Cloud Engineering (IC2E), 2015. 2015ic2e.pdf
T. Pasquier, J. Singh, J. Bacon, and O. Hermant, “Managing Big Data with Information Flow Control,” in International Conference on Cloud Computing (CLOUD), 2015. 2015ieeecloud.pdf
J. Singh, T. Pasquier, and J. Bacon, “Securing Tags to Control Information Flows within the Internet of Things,” in International Conference on Recent Advances in Internet of Things (RIoT'15), 2015. 2015riot.pdf
2014
T. Pasquier, J. Bacon, and D. Eyers, “FlowK: Information Flow Control for the Cloud,” in International Conference on Cloud Computing Technology and Science (CloudCom'14), 2014. 2014cloudcom.pdf
T. Pasquier, J. Bacon, and B. Shand, “FlowR: Aspect Oriented Programming for Information Flow Control in Ruby,” in International Conference on Modularity, 2014. 2014modularity.pdf
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information Flow Control for Secure Cloud Computing,” in IEEE Transactions on Network and System Management, SI Cloud Service Management, 2014, vol. 11, no. 1, pp. 76-89. 2014tnsm.pdf

Pages