T
Thomas Pasquier
Researcher at University of Bristol
Publications - 58
Citations - 1361
Thomas Pasquier is an academic researcher from University of Bristol. The author has contributed to research in topics: Cloud computing & Information flow (information theory). The author has an hindex of 17, co-authored 58 publications receiving 1010 citations. Previous affiliations of Thomas Pasquier include Harvard University & University of Cambridge.
Papers
More filters
Journal ArticleDOI
Twenty Security Considerations for Cloud-Supported Internet of Things
TL;DR: This paper focuses on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies.
Journal ArticleDOI
Information Flow Control for Secure Cloud Computing
TL;DR: The properties of cloud computing-Platform-as-a-Service clouds in particular- are described and a range of IFC models and implementations are reviewed to identify opportunities for using IFC within a cloud computing context.
Proceedings ArticleDOI
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats.
TL;DR: UNICORN is presented, an anomaly-based APT detector that effectively leverages data provenance analysis that outperforms an existing state-of-the-art APT detection system and detects real-life APT scenarios with high accuracy.
Proceedings ArticleDOI
Practical whole-system provenance capture
Thomas Pasquier,Xueyuan Han,Mark Goldstein,Thomas Moyer,David Eyers,Margo Seltzer,Jean Bacon +6 more
TL;DR: CamFlow as discussed by the authors is a whole-system provenance capture mechanism that integrates easily into a PaaS offering by leveraging the latest kernel design advances to achieve efficiency and using a self-contained, easily maintainable implementation relying on a Linux Security Module, NetFilter, and other existing kernel facilities.
Journal ArticleDOI
Camflow: Managed Data-Sharing for Cloud Services
TL;DR: The potential of cloud-deployed IFC for enforcing owners’ data flow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software is discussed.