Jatinder Singh

According to our database1, Jatinder Singh authored at least 86 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Personal Information Management Systems.
Internet Policy Rev., 2022

Data intermediary.
Internet Policy Rev., 2022

Data Justice in Practice: A Guide for Developers.
CoRR, 2022

Advancing Data Justice Research and Practice: An Integrated Literature Review.
CoRR, 2022

Disclosure by Design: Designing information disclosures to support meaningful transparency and accountability.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

Exploring How Machine Learning Practitioners (Try To) Use Fairness Toolkits.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

Making Algorithmic Systems More Meaningfully Transparent for Users Through Visualisation.
Proceedings of the DIS '22: Designing Interactive Systems Conference, Virtual Event, Australia, June 13, 2022

2021
Auditable Augmented/Mixed/Virtual Reality: The Practicalities of Mobile System Transparency.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Towards an accountable Internet of Things: A call for 'reviewability'.
CoRR, 2021

Artificial intelligence as a service: Legal responsibilities, liabilities, and policy challenges.
Comput. Law Secur. Rev., 2021

Enclaves in the clouds.
Commun. ACM, 2021

Formalising trade-offs beyond algorithmic fairness: lessons from ethical philosophy and welfare economics.
AI Ethics, 2021

Reviewable Automated Decision-Making: A Framework for Accountable Algorithmic Systems.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

Differential Tweetment: Mitigating Racial Dialect Bias in Harmful Tweet Detection.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

The Landscape and Gaps in Open Source Fairness Toolkits.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Risk Identification Questionnaire for Detecting Unintended Bias in the Machine Learning Development Lifecycle.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

Monitoring AI Services for Misuse.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

2020
Enclaves in the Clouds: Legal considerations and broader implications.
ACM Queue, 2020

Personal information management systems: a user-centric privacy utopia?
Internet Policy Rev., 2020

Centering the Law in the Digital State.
Computer, 2020

Reviewable Automated Decision-Making.
Comput. Law Secur. Rev., 2020

A Call for Auditable Virtual, Augmented and Mixed Reality.
Proceedings of the VRST '20: 26th ACM Symposium on Virtual Reality Software and Technology, 2020

Regulating transparency?: Facebook, Twitter and the german network enforcement act.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Monitoring Misuse for Accountable 'Artificial Intelligence as a Service'.
Proceedings of the AIES '20: AAAI/ACM Conference on AI, 2020

2019
The Security Implications of Data Subject Rights.
IEEE Secur. Priv., 2019

Regulating Recommending: Motivations, Considerations, and Principles.
Eur. J. Law Technol., 2019

Blockchain And The Future of the Internet: A Comprehensive Review.
CoRR, 2019

Decision Provenance: Harnessing Data Flow for Accountable Systems.
IEEE Access, 2019

SGX-PySpark: Secure Distributed Data Analytics.
Proceedings of the World Wide Web Conference, 2019

Performance Analysis of Free Space Optical Communication Systems for High-Speed Trains.
Proceedings of the 10th International Conference on Computing, 2019

Explaining automated environments: interrogating scripts, logs, and provenance using voice-assistants.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Data provenance to audit compliance with privacy policy in the Internet of Things.
Pers. Ubiquitous Comput., 2018

Towards Accountable Systems (Dagstuhl Seminar 18181).
Dagstuhl Reports, 2018

Decision Provenance: Capturing data flow for accountable systems.
CoRR, 2018

Accountability in the IoT: Systems, Law, and Ways Forward.
Computer, 2018

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET.
Clust. Comput., 2018

Pervasive Communities in the Internet of People.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

ComFlux: A Dynamic External Management Regime for Pervasive Applications.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

CLAW 2018: Chairs' Message: Fourth Workshop on Legal and Technical Issues in Cloud and Pervasive Computing (IoT).
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

RECLAIMING Data: Overcoming App Identification Barriers for Exercising Data Protection Rights.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Blockchain as a Service (BaaS): Providers and Trust.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Camflow: Managed Data-Sharing for Cloud Services.
IEEE Trans. Cloud Comput., 2017

An intelligent approach to Big Data analytics for sustainable retail environment using Apriori-MapReduce framework.
Ind. Manag. Data Syst., 2017

ComFlux: External Composition and Adaptation of Pervasive Applications.
CoRR, 2017

Internet of Things Ecosystems: Unpacking Legal Relationships and Liabilities.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

2016
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud.
Tiny Trans. Comput. Sci., 2016

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks.
Mob. Inf. Syst., 2016

Twenty Security Considerations for Cloud-Supported Internet of Things.
IEEE Internet Things J., 2016

Policy, legal and regulatory implications of a Europe-only cloud.
Int. J. Law Inf. Technol., 2016

Effects of Residual Charge on the Performance of Electro-Adhesive Grippers.
Proceedings of the Towards Autonomous Robotic Systems - 17th Annual Conference, 2016

Data-Centric Access Control for Cloud Computing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Information Flow Audit for PaaS Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

2015
The role of reconfigurable, policy-based middleware in supporting the Internet of Things.
Tiny Trans. Comput. Sci., 2015

Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience.
CoRR, 2015

Data Flow Management and Compliance in Cloud Computing.
IEEE Cloud Comput., 2015

Securing tags to control information flows within the Internet of Things.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating Messaging Middleware and Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Information Flow Control for Strong Protection with Flexible Sharing in PaaS.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Clouds of Things Need Information Flow Control with Hardware Roots of Trust.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Managing Big Data with Information Flow Control.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Information Flow Control for Secure Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2014

On middleware for emerging health services.
J. Internet Serv. Appl., 2014

Policy enforcement within emerging distributed, event-based systems.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2012
A cross-layer based intrusion detection technique for wireless networks.
Int. Arab J. Inf. Technol., 2012

2011
Managing Health Information Flows with a Reconfigurable Component-Based Middleware.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Disclosure control in multi-domain publish/subscribe systems.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

2010
Controlling the dissemination and disclosure of healthcare events.
PhD thesis, 2010

A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN
CoRR, 2010

Information-centric pervasive healthcare platforms.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

Context-aware disclosure of health sensor data.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

Relational database support for event-based middleware functionality.
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, 2010

Securing Event-Based Systems.
Proceedings of the Principles and Applications of Distributed Event-Based Systems, 2010

2009
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen).
it Inf. Technol., 2009

2008
Policy-Based Information Sharing in Publish/Subscribe Middleware.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A model for controlling data flow in distributed healthcare environments.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Controlling historical information dissemination in publish/subscribe.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Credential management in event-driven healthcare systems.
Proceedings of the Middleware 2008, 2008

Event-based data control in healthcare.
Proceedings of the Middleware 2008, 2008

Event-Based Data Dissemination Control in Healthcare.
Proceedings of the Electronic Healthcare, First International Conference, 2008

Access control in publish/subscribe systems.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Dynamic trust domains for secure, private, technology-assisted living.
Proceedings of the The Second International Conference on Availability, 2007

2006
Parameter Estimation using Large Amplitude Data from Real Time Simulator of an Aircraft.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2004
Augmenting overlay trees for failure resiliency.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...