{SCONE}: Secure linux containers with intel {SGX} S Arnautov, B Trach, F Gregor, T Knauth, A Martin, C Priebe, J Lind, ... 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016 | 1052 | 2016 |
Twenty security considerations for cloud-supported Internet of Things J Singh, T Pasquier, J Bacon, H Ko, D Eyers IEEE Internet of things Journal 3 (3), 269-284, 2015 | 431 | 2015 |
Using trust and risk in role-based access control policies N Dimmock, A Belokosztolszki, D Eyers, J Bacon, K Moody Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 237 | 2004 |
Glamdring: Automatic application partitioning for intel {SGX} J Lind, C Priebe, D Muthukumaran, D O'Keeffe, PL Aublin, F Kelbert, ... 2017 USENIX Annual Technical Conference (USENIX ATC 17), 285-298, 2017 | 221 | 2017 |
Practical whole-system provenance capture T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017 | 174 | 2017 |
Information flow control for secure cloud computing J Bacon, D Eyers, TFJM Pasquier, J Singh, I Papagiannis, P Pietzuch IEEE Transactions on network and Service Management 11 (1), 76-89, 2014 | 173 | 2014 |
Role-based access control for publish/subscribe middleware architectures A Belokosztolszki, DM Eyers, PR Pietzuch, J Bacon, K Moody Proceedings of the 2nd international workshop on Distributed event-based …, 2003 | 157 | 2003 |
Access control in publish/subscribe systems J Bacon, DM Eyers, J Singh, PR Pietzuch Proceedings of the second international conference on Distributed event …, 2008 | 136 | 2008 |
CamFlow: Managed data-sharing for cloud services TFJM Pasquier, J Singh, D Eyers, J Bacon IEEE Transactions on Cloud Computing 5 (3), 472-484, 2015 | 111 | 2015 |
Runtime analysis of whole-system provenance T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 102 | 2018 |
Data provenance to audit compliance with privacy policy in the Internet of Things T Pasquier, J Singh, J Powles, D Eyers, M Seltzer, J Bacon Personal and Ubiquitous Computing 22, 333-344, 2018 | 98 | 2018 |
Efficient data tagging for managing privacy in the internet of things D Evans, DM Eyers 2012 IEEE International Conference on Green Computing and Communications …, 2012 | 79 | 2012 |
TaLoS: Secure and transparent TLS termination inside SGX enclaves PL Aublin, F Kelbert, D O’keeffe, D Muthukumaran, C Priebe, J Lind, ... Imperial College London, Tech. Rep 5 (2017), 01, 2017 | 77 | 2017 |
OASIS role-based access control for electronic health records DM Eyers, J Bacon, K Moody IEE Proceedings-Software 153 (1), 16-23, 2006 | 73 | 2006 |
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks LIW Pesonen, DM Eyers, J Bacon Proceedings of the 2007 inaugural international conference on Distributed …, 2007 | 69 | 2007 |
Towards a common api for publish/subscribe P Pietzuch, D Eyers, S Kounev, B Shand Proceedings of the 2007 inaugural international conference on Distributed …, 2007 | 65 | 2007 |
P-Scheduler: adaptive hierarchical scheduling in apache storm L Eskandari, Z Huang, D Eyers Proceedings of the Australasian Computer Science Week Multiconference, 1-10, 2016 | 64 | 2016 |
{DEFCON}:{High-Performance} Event Processing with Information Security M Migliavacca, I Papagiannis, DM Eyers, B Shand, J Bacon, P Pietzuch 2010 USENIX Annual Technical Conference (USENIX ATC 10), 2010 | 61 | 2010 |
Enforcing End-to-End Application Security in the Cloud: (Big Ideas Paper) J Bacon, D Evans, DM Eyers, M Migliavacca, P Pietzuch, B Shand Middleware 2010: ACM/IFIP/USENIX 11th International Middleware Conference …, 2010 | 56 | 2010 |
Evaluating the impact of network latency on the safety of blockchain transactions L Wan, D Eyers, H Zhang 2019 IEEE International Conference on Blockchain (Blockchain), 194-201, 2019 | 54 | 2019 |