All Stories

  1. On the Reproducibility of Provenance-based Intrusion Detection that uses Deep Learning
  2. SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions
  3. Intrusion Detection at the IoT Edge Using Federated Learning
  4. Computational Experiment Comprehension using Provenance Summarization
  5. Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing
  6. Making Provenance Work for You
  7. PACED: Provenance-based Automated Container Escape Detection
  8. A large-scale study on research code quality and execution
  9. Secure Namespaced Kernel Audit for Containers
  10. To Tune or Not to Tune?
  11. Xanthus: Push-button Orchestration of Host Provenance Data Collection
  12. Facilitating plausible deniability for cloud providers regarding tenants’ activities using trusted execution
  13. Rclean: A Tool for Writing Cleaner, More Transparent Code
  14. Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats
  15. ProvMark
  16. Towards Seamless Configuration Tuning of Big Data Analytics
  17. Personal data and the internet of things
  18. From Here to Provtopia
  19. Sharing and Preserving Computational Analyses for Posterity with encapsulator
  20. Runtime Analysis of Whole-System Provenance
  21. Practical whole-system provenance capture
  22. If these data could talk
  23. Data provenance to audit compliance with privacy policy in the Internet of Things
  24. Camflow: Managed Data-Sharing for Cloud Services
  25. PHP2Uni: Building Unikernels Using Scripting Language Transpilation
  26. CloudSafetyNet
  27. Twenty Security Considerations for Cloud-Supported Internet of Things
  28. Information Flow Audit for PaaS Clouds
  29. Information Flow Audit for Transparency and Compliance in the Handling of Personal Data
  30. Information Flow Control with Minimal Tag Disclosure
  31. Data-Centric Access Control for Cloud Computing
  32. Big ideas paper
  33. Clouds of Things Need Information Flow Control with Hardware Roots of Trust
  34. Data Flow Management and Compliance in Cloud Computing
  35. Managing Big Data with Information Flow Control
  36. Securing tags to control information flows within the Internet of Things
  37. Expressing and Enforcing Location Requirements in the Cloud Using Information Flow Control
  38. Information Flow Control for Strong Protection with Flexible Sharing in PaaS
  39. Integrating Messaging Middleware and Information Flow Control
  40. FlowK: Information Flow Control for the Cloud
  41. Information Flow Control for Secure Cloud Computing
  42. FlowR