2014
- Jean Bacon, David Eyers, Thomas F.J.-M. Pasquier, Jatinder Singh, Ioannis
Papagiannis, and Peter Pietzuch.
Information Flow Control for Secure Cloud Computing.
Network and Service Management, IEEE Transactions on,
11(1):76-89, March 2014.
[ bib |
DOI |
.pdf ]
Keywords: Access control;Cloud computing;Data models;Runtime;Software as a service;Cloud;data security;information flow;information flow control (IFC)
- Kuan Hon, Christopher Millard, Chris Reed, Jatinder Singh, Ian Walden, and Jon Crowcroft. Policy, Legal and Regulatory Implications of a Europe-Only Cloud. Technical report, Queen Mary University of London, School of Law, 2014. [ bib | .pdf ]
- Thomas F. J.-M. Pasquier, Jean Bacon, and David Eyers. FlowK: Information Flow Control for the Cloud. In 6th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, Dec 2014. [ bib | .pdf ]
- Thomas F. J.-M. Pasquier, Jean Bacon, and Brian Shand.
FlowR: Aspect Oriented Programming for Information Flow Control
in Ruby.
In Proceedings of the 13th International Conference on
Modularity, MODULARITY '14, pages 37-48, New York, NY, USA, 2014. ACM, Open
Access.
[ bib |
DOI |
http |
.pdf ]
Keywords: aspect oriented programming, information flow control, security
- Jatinder Singh and Jean Bacon. On Middleware for Emerging Health Services. Journal of Internet Services and Applications (JISA), 5(6):1-34, May 2014. [ bib | DOI | .pdf ]
- Jatinder Singh, Jean Bacon, Jon Crowcroft, Anil Madhavapeddy, Thomas Pasquier, W. Kuan Hon, and Christopher Millard. Regional Clouds: Technical Considerations. Technical Report UCAM-CL-TR-863, University of Cambridge, 2014. [ bib | .pdf ]
- Jatinder Singh, Jean Bacon, and David Eyers.
Policy enforcement within emerging distributed, event-based
systems.
In Proceedings of the 8th ACM International Conference on
Distributed Event-Based Systems, DEBS '14, pages 246-255, New York, NY,
USA, 2014. ACM.
[ bib |
DOI |
http |
.pdf ]
Keywords: enforcement, event-based systems, internet of things, middleware, pervasive, policy, reconfiguration, security, service
This file has been generated by bibtex2html 1.87.