Publications

Filter by type:

System level provenance is of widespread interest for applications such as security enforcement and information protection. However, …

Valuable, sensitive, and regulated data flow freely through distributed governing the collection, use, and management of such data? We …

The execution of distributed data processing workloads (such as those running on top of Hadoop or Spark) in cloud environments presents …

The Internet of Things promises a connected environment reacting to and addressing our every need, but based on the assumption that all …

Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …

Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …

Open data and open-source software may be part of the solution to science’s “reproducibility crisis”, but they are insufficient to …

Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data …

Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been …

In the last few decades, data-driven methods have come to dominate many fields of scientific inquiry. Open data and open-source …

We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for Platform as a Service (PaaS) users, who run many …

Unikernels are a rapidly emerging technology in the world of cloud computing. Unikernels build on research on library operating systems …

Internet of Things (IoT) applications, systems and services are subject to law. We argue that for the IoT to develop lawfully, there …

The usual approach to security for cloud-hosted applications is strong separation. However, it is often the case that the same data is …

To realize the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down …

The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As the proportion of services …

With the rapid increase in uptake of cloud services, issues of data management are becoming increasingly prominent. There is a clear, …

There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled …

A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many …

As cloud computing becomes an increasingly dominant means of providing computing resources, the legal and regulatory issues associated …

Concern about data leakage is holding back more widespread adoption of cloud computing by companies and public institutions alike. To …

To realise the full potential of the Internet of Things (loT), loT architectures are moving towards open and dynamic interoperability, …

Security is an ongoing challenge in cloud computing. Currently, cloud consumers have few mechanisms for managing their data within the …

The need to share data across applications is becoming increasingly evident. Current cloud isolation mechanisms focus solely on …

The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As cloud service provision increases, …

Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and …

The emergence and rapid uptake of cloud computing services raise a number of legal challenges. Recently, there have been calls for …

This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our aim was to support the use of an …

Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well …