scispace - formally typeset
T

Thomas Pasquier

Researcher at University of Bristol

Publications -  58
Citations -  1361

Thomas Pasquier is an academic researcher from University of Bristol. The author has contributed to research in topics: Cloud computing & Information flow (information theory). The author has an hindex of 17, co-authored 58 publications receiving 1010 citations. Previous affiliations of Thomas Pasquier include Harvard University & University of Cambridge.

Papers
More filters
Journal ArticleDOI

Twenty Security Considerations for Cloud-Supported Internet of Things

TL;DR: This paper focuses on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies.
Journal ArticleDOI

Information Flow Control for Secure Cloud Computing

TL;DR: The properties of cloud computing-Platform-as-a-Service clouds in particular- are described and a range of IFC models and implementations are reviewed to identify opportunities for using IFC within a cloud computing context.
Proceedings ArticleDOI

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats.

TL;DR: UNICORN is presented, an anomaly-based APT detector that effectively leverages data provenance analysis that outperforms an existing state-of-the-art APT detection system and detects real-life APT scenarios with high accuracy.
Proceedings ArticleDOI

Practical whole-system provenance capture

TL;DR: CamFlow as discussed by the authors is a whole-system provenance capture mechanism that integrates easily into a PaaS offering by leveraging the latest kernel design advances to achieve efficiency and using a self-contained, easily maintainable implementation relying on a Linux Security Module, NetFilter, and other existing kernel facilities.
Journal ArticleDOI

Camflow: Managed Data-Sharing for Cloud Services

TL;DR: The potential of cloud-deployed IFC for enforcing owners’ data flow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software is discussed.