Thomas F. J.-M. Pasquier

According to our database1, Thomas F. J.-M. Pasquier authored at least 37 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Rclean: A Tool for Writing Cleaner, More Transparent Code.
J. Open Source Softw., 2020

SIGL: Securing Software Installations Through Deep Graph Learning.
CoRR, 2020

Tuneful: An Online Significance-Aware Configuration Tuner for Big Data Analytics.
CoRR, 2020

Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

To Tune or Not to Tune?: In Search of Optimal Configurations for Data Analytics.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

Xanthus: Push-button Orchestration of Host Provenance Data Collection.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

2019
Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance.
CoRR, 2019

Personal data and the internet of things.
Commun. ACM, 2019

From Here to Provtopia.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

ProvMark: A Provenance Expressiveness Benchmarking System.
Proceedings of the 20th International Middleware Conference, 2019

Towards Seamless Configuration Tuning of Big Data Analytics.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Data provenance to audit compliance with privacy policy in the Internet of Things.
Pers. Ubiquitous Comput., 2018

Sharing and Preserving Computational Analyses for Posterity with encapsulator.
Comput. Sci. Eng., 2018

Provenance-based Intrusion Detection: Opportunities and Challenges.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Camflow: Managed Data-Sharing for Cloud Services.
IEEE Trans. Cloud Comput., 2017

PHP2Uni: Building Unikernels Using Scripting Language Transpilation.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

FRAPpuccino: Fault-detection through Runtime Analysis of Provenance.
Proceedings of the 9th USENIX Workshop on Hot Topics in Cloud Computing, 2017

Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud.
Tiny Trans. Comput. Sci., 2016

Twenty Security Considerations for Cloud-Supported Internet of Things.
IEEE Internet Things J., 2016

Data-Centric Access Control for Cloud Computing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

Information Flow Audit for PaaS Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Information Flow Audit for Transparency and Compliance in the Handling of Personal Data.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

2015
Data Flow Management and Compliance in Cloud Computing.
IEEE Cloud Comput., 2015

Securing tags to control information flows within the Internet of Things.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Integrating Messaging Middleware and Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Information Flow Control for Strong Protection with Flexible Sharing in PaaS.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Clouds of Things Need Information Flow Control with Hardware Roots of Trust.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Managing Big Data with Information Flow Control.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Information Flow Control for Secure Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2014

FlowK: Information Flow Control for the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

FlowR: aspect oriented programming for information flow control in ruby.
Proceedings of the 13th International Conference on Modularity, 2014


  Loading...