Secure Namespaced Kernel Audit for Containers
SIGL: Securing Software Installations Through Deep Graph Learning
Xanthus: Push-button Orchestration of Host Provenance Data Collection
ProvMark: A Provenance Expressiveness Benchmarking System
From Here to Provtopia
Towards Seamless Configuration Tuning of Big Data Analytics
Runtime Analysis of Whole-System Provenance
Sharing and Preserving Computational Analyses for Posterity with encapsulator
Data provenance to audit compliance with privacy policy in the Internet of Things
Practical Whole-System Provenance Capture
If these data could talk
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
Data-Centric Access Control for Cloud Computing
Twenty security considerations for cloud-supported Internet of Things
Information Flow Audit for PaaS clouds
CamFlow: Managed Data-Sharing for Cloud Services
Data Flow Management and Compliance in Cloud Computing
Managing Big Data with Information Flow Control
Integrating Middleware with Information Flow Control
FlowK: Information Flow Control for the Cloud
Regional clouds: technical considerations
Information Flow Control for Secure Cloud Computing