Παρακολούθηση
David Eyers
David Eyers
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.otago.ac.nz
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
{SCONE}: Secure linux containers with intel {SGX}
S Arnautov, B Trach, F Gregor, T Knauth, A Martin, C Priebe, J Lind, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
10122016
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko, D Eyers
IEEE Internet of things Journal 3 (3), 269-284, 2015
4122015
Using trust and risk in role-based access control policies
N Dimmock, A Belokosztolszki, D Eyers, J Bacon, K Moody
Proceedings of the ninth ACM symposium on Access control models and …, 2004
2342004
Glamdring: Automatic application partitioning for intel {SGX}
J Lind, C Priebe, D Muthukumaran, D O'Keeffe, PL Aublin, F Kelbert, ...
2017 USENIX Annual Technical Conference (USENIX ATC 17), 285-298, 2017
2092017
Information flow control for secure cloud computing
J Bacon, D Eyers, TFJM Pasquier, J Singh, I Papagiannis, P Pietzuch
IEEE Transactions on network and Service Management 11 (1), 76-89, 2014
1702014
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
1602017
Role-based access control for publish/subscribe middleware architectures
A Belokosztolszki, DM Eyers, PR Pietzuch, J Bacon, K Moody
Proceedings of the 2nd international workshop on Distributed event-based …, 2003
1572003
Access control in publish/subscribe systems
J Bacon, DM Eyers, J Singh, PR Pietzuch
Proceedings of the second international conference on Distributed event …, 2008
1332008
CamFlow: Managed data-sharing for cloud services
TFJM Pasquier, J Singh, D Eyers, J Bacon
IEEE Transactions on Cloud Computing 5 (3), 472-484, 2015
1072015
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
992018
Data provenance to audit compliance with privacy policy in the Internet of Things
T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon
Personal and Ubiquitous Computing 22, 333-344, 2018
882018
Efficient data tagging for managing privacy in the internet of things
D Evans, DM Eyers
2012 IEEE International Conference on Green Computing and Communications …, 2012
812012
TaLoS: Secure and transparent TLS termination inside SGX enclaves
PL Aublin, F Kelbert, D O’keeffe, D Muthukumaran, C Priebe, J Lind, ...
Imperial College London, Tech. Rep 5 (2017), 01, 2017
752017
OASIS role-based access control for electronic health records
DM Eyers, J Bacon, K Moody
IEE Proceedings-Software 153 (1), 16-23, 2006
732006
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
LIW Pesonen, DM Eyers, J Bacon
Proceedings of the 2007 inaugural international conference on Distributed …, 2007
682007
Towards a common api for publish/subscribe
P Pietzuch, D Eyers, S Kounev, B Shand
Proceedings of the 2007 inaugural international conference on Distributed …, 2007
652007
P-Scheduler: adaptive hierarchical scheduling in apache storm
L Eskandari, Z Huang, D Eyers
Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016
612016
{DEFCON}:{High-Performance} Event Processing with Information Security
M Migliavacca, I Papagiannis, DM Eyers, B Shand, J Bacon, P Pietzuch
2010 USENIX Annual Technical Conference (USENIX ATC 10), 2010
612010
Enforcing End-to-End Application Security in the Cloud: (Big Ideas Paper)
J Bacon, D Evans, DM Eyers, M Migliavacca, P Pietzuch, B Shand
Middleware 2010: ACM/IFIP/USENIX 11th International Middleware Conference …, 2010
552010
Cloudsafetynet: Detecting data leakage between cloud tenants
C Priebe, D Muthukumaran, D O'Keeffe, D Eyers, B Shand, R Kapitza, ...
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing …, 2014
542014
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20