Jatinder Singh

According to our database1, Jatinder Singh authored at least 61 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Regulating transparency?: Facebook, Twitter and the german network enforcement act.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Monitoring Misuse for Accountable 'Artificial Intelligence as a Service'.
Proceedings of the AIES '20: AAAI/ACM Conference on AI, 2020

2019
The Security Implications of Data Subject Rights.
IEEE Security & Privacy, 2019

Blockchain And The Future of the Internet: A Comprehensive Review.
CoRR, 2019

Decision Provenance: Harnessing Data Flow for Accountable Systems.
IEEE Access, 2019

SGX-PySpark: Secure Distributed Data Analytics.
Proceedings of the World Wide Web Conference, 2019

Explaining automated environments: interrogating scripts, logs, and provenance using voice-assistants.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Data provenance to audit compliance with privacy policy in the Internet of Things.
Personal and Ubiquitous Computing, 2018

Towards Accountable Systems (Dagstuhl Seminar 18181).
Dagstuhl Reports, 2018

Decision Provenance: Capturing data flow for accountable systems.
CoRR, 2018

Accountability in the IoT: Systems, Law, and Ways Forward.
IEEE Computer, 2018

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET.
Cluster Computing, 2018

Pervasive Communities in the Internet of People.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

ComFlux: A Dynamic External Management Regime for Pervasive Applications.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

CLAW 2018: Chairs' Message: Fourth Workshop on Legal and Technical Issues in Cloud and Pervasive Computing (IoT).
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

RECLAIMING Data: Overcoming App Identification Barriers for Exercising Data Protection Rights.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Blockchain as a Service (BaaS): Providers and Trust.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks.
Wireless Communications and Mobile Computing, 2017

Camflow: Managed Data-Sharing for Cloud Services.
IEEE Trans. Cloud Computing, 2017

An intelligent approach to Big Data analytics for sustainable retail environment using Apriori-MapReduce framework.
Industrial Management and Data Systems, 2017

ComFlux: External Composition and Adaptation of Pervasive Applications.
CoRR, 2017

Internet of Things Ecosystems: Unpacking Legal Relationships and Liabilities.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

2016
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud.
TinyToCS, 2016

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks.
Mobile Information Systems, 2016

Twenty Security Considerations for Cloud-Supported Internet of Things.
IEEE Internet of Things Journal, 2016

Policy, legal and regulatory implications of a Europe-only cloud.
I. J. Law and Information Technology, 2016

Effects of Residual Charge on the Performance of Electro-Adhesive Grippers.
Proceedings of the Towards Autonomous Robotic Systems - 17th Annual Conference, 2016

Data-Centric Access Control for Cloud Computing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Information Flow Audit for PaaS Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

2015
The role of reconfigurable, policy-based middleware in supporting the Internet of Things.
TinyToCS, 2015

Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience.
CoRR, 2015

Data Flow Management and Compliance in Cloud Computing.
IEEE Cloud Computing, 2015

Securing tags to control information flows within the Internet of Things.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating Messaging Middleware and Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Information Flow Control for Strong Protection with Flexible Sharing in PaaS.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Clouds of Things Need Information Flow Control with Hardware Roots of Trust.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Managing Big Data with Information Flow Control.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Information Flow Control for Secure Cloud Computing.
IEEE Trans. Network and Service Management, 2014

On middleware for emerging health services.
J. Internet Services and Applications, 2014

Policy enforcement within emerging distributed, event-based systems.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2012
A cross-layer based intrusion detection technique for wireless networks.
Int. Arab J. Inf. Technol., 2012

2011
Managing Health Information Flows with a Reconfigurable Component-Based Middleware.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Disclosure control in multi-domain publish/subscribe systems.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

2010
Controlling the dissemination and disclosure of healthcare events.
PhD thesis, 2010

A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN
CoRR, 2010

Information-centric pervasive healthcare platforms.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

Context-aware disclosure of health sensor data.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

Relational database support for event-based middleware functionality.
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, 2010

Securing Event-Based Systems.
Proceedings of the Principles and Applications of Distributed Event-Based Systems, 2010

2009
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen).
it - Information Technology, 2009

2008
Policy-Based Information Sharing in Publish/Subscribe Middleware.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A model for controlling data flow in distributed healthcare environments.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Controlling historical information dissemination in publish/subscribe.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Credential management in event-driven healthcare systems.
Proceedings of the Middleware 2008, 2008

Event-based data control in healthcare.
Proceedings of the Middleware 2008, 2008

Event-Based Data Dissemination Control in Healthcare.
Proceedings of the Electronic Healthcare, First International Conference, 2008

Access control in publish/subscribe systems.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Dynamic trust domains for secure, private, technology-assisted living.
Proceedings of the The Second International Conference on Availability, 2007

2006
Parameter Estimation using Large Amplitude Data from Real Time Simulator of an Aircraft.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006


  Loading...