default search action
Jean Bacon
Person information
- affiliation: University of Cambridge, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2003
- [b2]Jean Bacon, Tim Harris:
Operating Systems - Concurrent and Distributed Software Design. International computer science series, Addison-Wesley 2003, ISBN 978-0-321-11789-2, pp. I-XXXIV, 1-877 - 1993
- [b1]Jean Bacon:
Concurrent systems - an integrated approach to operating systems, databases and distributed systems. Addison-Wesley 1993, ISBN 978-0-201-41677-0, pp. I-XXVIII, 1-602
Journal Articles
- 2019
- [j48]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
Personal data and the internet of things. Commun. ACM 62(6): 32-34 (2019) - 2018
- [j47]Thomas F. J.-M. Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. Pers. Ubiquitous Comput. 22(2): 333-344 (2018) - 2017
- [j46]Thomas F. J.-M. Pasquier, Jatinder Singh, David M. Eyers, Jean Bacon:
Camflow: Managed Data-Sharing for Cloud Services. IEEE Trans. Cloud Comput. 5(3): 472-484 (2017) - 2016
- [j45]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, Hajoon Ko, David M. Eyers:
Twenty Security Considerations for Cloud-Supported Internet of Things. IEEE Internet Things J. 3(3): 269-284 (2016) - 2015
- [j44]Jatinder Singh, Julia E. Powles, Thomas F. J.-M. Pasquier, Jean Bacon:
Data Flow Management and Compliance in Cloud Computing. IEEE Cloud Comput. 2(4): 24-32 (2015) - 2014
- [j43]Jatinder Singh, Jean Bacon:
On middleware for emerging health services. J. Internet Serv. Appl. 5(1): 6:1-6:19 (2014) - [j42]Jean Bacon, David M. Eyers, Thomas F. J.-M. Pasquier, Jatinder Singh, Ioannis Papagiannis, Peter R. Pietzuch:
Information Flow Control for Secure Cloud Computing. IEEE Trans. Netw. Serv. Manag. 11(1): 76-89 (2014) - 2010
- [j41]Eleftheria Katsiri, Jean Bacon, Alan Mycroft:
Linking Temporal First Order Logic and Hidden Markov Models with Abstract Events. Int. J. Artif. Intell. Tools 19(6): 857-893 (2010) - 2009
- [j40]Steven O. Kimbrough, Alan S. Abrahams, Andrew J. I. Jones, David M. Eyers, Jean Bacon:
Introducing the fair and logical trade project. Int. J. Bus. Process. Integr. Manag. 4(3): 174-186 (2009) - [j39]Alan S. Abrahams, David M. Eyers, Jean Bacon:
Structured storage of legal precedents using a minimal deontic ontology, for computer assisted legal document querying. Int. J. Metadata Semant. Ontologies 4(3): 196-211 (2009) - [j38]Jean Bacon, David M. Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, Peter R. Pietzuch:
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen). it Inf. Technol. 51(5): 277-284 (2009) - [j37]Kai Sachs, Samuel Kounev, Jean Bacon, Alejandro P. Buchmann:
Performance evaluation of message-oriented middleware using the SPECjms2007 benchmark. Perform. Evaluation 66(8): 410-434 (2009) - [j36]Eiman Kanjo, Jean Bacon, David Roberts, Peter Landshoff:
MobSens: Making Smart Phones Smarter. IEEE Pervasive Comput. 8(4): 50-57 (2009) - [j35]Frank Zhigang Wang, Na Helian, Sining Wu, Yike Guo, Derek Yuhui Deng, Lingkui Meng, Wen Zhang, Jon Crowcroft, Jean Bacon, Michael Andrew Parker:
Eight Times Acceleration of Geospatial Data Archiving and Distribution on the Grids. IEEE Trans. Geosci. Remote. Sens. 47(5): 1444-1453 (2009) - [j34]Frank Zhigang Wang, Na Helian, Sining Wu, Yike Guo, Derek Yuhui Deng, Lingkui Meng, Wen Zhang, Jon Crowcroft, Jean Bacon, Michael Andrew Parker:
Correction to "Eight Times Acceleration of Geospatial Data Archiving and Distribution on the Grids". IEEE Trans. Geosci. Remote. Sens. 47(8-2): 2988 (2009) - 2007
- [j33]Eleftheria Katsiri, Jean Bacon, Alan Mycroft:
SCAFOS: linking sensor data to context-aware applications using abstract events. Int. J. Pervasive Comput. Commun. 3(4): 347-377 (2007) - [j32]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
Access Control in Decentralised Publish/Subscribe Systems. J. Networks 2(2): 57-67 (2007) - 2006
- [j31]David M. Eyers, Jean Bacon, Ken Moody:
OASIS role-based access control for electronic health records. IEE Proc. Softw. 153(1): 16-23 (2006) - [j30]Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David Naveen Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang:
Intelligent Transportation Systems. IEEE Pervasive Comput. 5(4): 63-67 (2006) - 2004
- [j29]Jean Bacon:
Middleware 2004 Works in Progess. IEEE Distributed Syst. Online 5(8) (2004) - [j28]Jean Bacon:
IEEE Distributed Systems Online: Looking to the Future. IEEE Internet Comput. 8(1): 7- (2004) - [j27]Peter R. Pietzuch, Brian Shand, Jean Bacon:
Composite Event Detection as a Generic Middleware Extension. IEEE Netw. 18(1): 44-55 (2004) - [j26]Brian Shand, Nathan Dimmock, Jean Bacon:
Trust for Ubiquitous, Transparent Collaboration. Wirel. Networks 10(6): 711-721 (2004) - 2003
- [j25]Vinny Cahill, Elizabeth Gray, Jean-Marc Seigneur, Christian Damsgaard Jensen, Yong Chen, Brian Shand, Nathan Dimmock, Andrew Twigg, Jean Bacon, Colin English, Waleed Wagealla, Sotirios Terzis, Paddy Nixon, Giovanna Di Marzo Serugendo, Ciarán Bryce, Marco Carbone, Karl Krukow, Mogens Nielsen:
Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Comput. 2(3): 52-61 (2003) - [j24]Jean Bacon:
IEEE Distributed Systems Online: Looking to the Future. IEEE Pervasive Comput. 2(4): 96 (2003) - [j23]Jean Bacon, Ken Moody, Walt Yao:
Access control and trust in the use of widely distributed services. Softw. Pract. Exp. 33(4): 375-394 (2003) - 2002
- [j22]Jean Bacon, Ken Moody:
Toward open, secure, widely distributed services. Commun. ACM 45(6): 59-64 (2002) - [j21]Jon Crowcroft, Jean Bacon, Peter R. Pietzuch, George Coulouris, Hani Naguib:
Channel islands in a reflective ocean: large-scale event distribution in heterogeneous networks. IEEE Commun. Mag. 40(9): 112-115 (2002) - [j20]Jean Bacon:
From the Editor in Chief: DS Online's New Partners. IEEE Distributed Syst. Online 3(1) (2002) - [j19]Jean Bacon:
New Online Partner for IEEE Internet Computing. IEEE Internet Comput. 6(1): 96 (2002) - [j18]Jean Bacon:
Toward Pervasive Computing. IEEE Pervasive Comput. 1(2): 84 (2002) - [j17]Jean Bacon, Ken Moody, Walt Yao:
A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002) - 2000
- [j16]Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri:
Generic Support for Distributed Applications. Computer 33(3): 68-76 (2000) - [j15]Jean Bacon:
From the Editor: Introduction - Serving the Distributed Systems Community. IEEE Distributed Syst. Online 1(1) (2000) - 1999
- [j14]Jean Bacon:
From the Editor-in-Chief: Evolving concepts for new applications. IEEE Concurr. 7(3): 2-3 (1999) - [j13]Jean Bacon:
Report on the Eighth ACM SIGOPS European Workshop: System Support for Composing Distributed Applications (Sintra, Portugal, 7-10 September 1998). ACM SIGOPS Oper. Syst. Rev. 33(1): 6-17 (1999) - 1998
- [j12]Jean Bacon, Richard Hayton, Ken Moody:
Middleware for Digital Libraries. D Lib Mag. 4(10) (1998) - 1997
- [j11]Jean Bacon, John Bates, David Halls:
Location-oriented multimedia. IEEE Wirel. Commun. 4(5): 48-57 (1997) - 1996
- [j10]John Bates, David Halls, Jean Bacon:
A Framework to Support Mobile Users of Multimedia Applications. Mob. Networks Appl. 1(4): 409-419 (1996) - 1995
- [j9]Zhixue Wu, Robert J. Stroud, Ken Moody, Jean Bacon:
The design and implementation of a distributed transaction system based on atomic data types. Distributed Syst. Eng. 2(1): 50-64 (1995) - [j8]Feng Huang, Jean Bacon, Glenford E. Mapp:
Virtual memory support for distributed computing environments using a shared data object model. Distributed Syst. Eng. 2(4): 202-211 (1995) - [j7]John Bates, Jean Bacon:
Supporting Interactive Presentation for Distributed Multimedia Applications. Multim. Tools Appl. 1(1): 47-78 (1995) - 1994
- [j6]Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody:
Extensible Access Control for a Hierarchy of Servers. ACM SIGOPS Oper. Syst. Rev. 28(3): 4-15 (1994) - 1991
- [j5]Jean Bacon, Ken Moody, Sue Thomson, Tim Wilson:
A Multi-Service Storage Architecture. ACM SIGOPS Oper. Syst. Rev. 25(4): 47-65 (1991) - 1987
- [j4]Synnove Vassiliades, Michael D. Sayers, Jean Bacon:
A protocol comparison. Comput. Commun. 10(1): 3-14 (1987) - 1986
- [j3]Synnove Vassiliades, Michael D. Sayers, Jean Bacon:
A Monitor Tool for a Network Based on the Cambridge Ring. Softw. Pract. Exp. 16(7): 671-687 (1986) - 1981
- [j2]Jean Bacon, Adrian Stokes:
Distributed system for educational use. Comput. Commun. 4(4): 174-178 (1981) - [j1]Jean Bacon:
An Approach to Distributed Software Systems. ACM SIGOPS Oper. Syst. Rev. 15(4): 62-74 (1981)
Conference and Workshop Papers
- 2018
- [c104]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c103]Raluca Diaconu, Jie Deng, Jean Bacon, Jatinder Singh:
ComFlux: A Dynamic External Management Regime for Pervasive Applications. PerCom Workshops 2018: 427-429 - 2017
- [c102]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical whole-system provenance capture. SoCC 2017: 405-418 - [c101]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
PHP2Uni: Building Unikernels Using Scripting Language Transpilation. IC2E 2017: 197-203 - 2016
- [c100]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon, David M. Eyers:
Information Flow Audit for PaaS Clouds. IC2E 2016: 42-51 - [c99]Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier, Changyu Dong, David M. Eyers, Jean Bacon:
Information Flow Control with Minimal Tag Disclosure. ICC 2016 2016: 17:1-17:4 - [c98]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, Julia E. Powles, Raluca Diaconu, David M. Eyers:
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things. Middleware 2016: 13 - [c97]Thomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers:
Data-Centric Access Control for Cloud Computing. SACMAT 2016: 81-88 - 2015
- [c96]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon, Olivier Hermant:
Managing Big Data with Information Flow Control. CLOUD 2015: 524-531 - [c95]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon:
Clouds of Things Need Information Flow Control with Hardware Roots of Trust. CloudCom 2015: 467-470 - [c94]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, David M. Eyers:
Integrating Messaging Middleware and Information Flow Control. IC2E 2015: 54-59 - [c93]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon:
Information Flow Control for Strong Protection with Flexible Sharing in PaaS. IC2E 2015: 279-282 - [c92]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon:
Securing tags to control information flows within the Internet of Things. RIoT 2015: 1-6 - 2014
- [c91]Thomas F. J.-M. Pasquier, Jean Bacon, Brian Shand:
FlowR: aspect oriented programming for information flow control in ruby. MODULARITY 2014: 37-48 - [c90]Thomas F. J.-M. Pasquier, Jean Bacon, David M. Eyers:
FlowK: Information Flow Control for the Cloud. CloudCom 2014: 70-77 - [c89]Jatinder Singh, Jean Bacon, David M. Eyers:
Policy enforcement within emerging distributed, event-based systems. DEBS 2014: 246-255 - 2012
- [c88]David Evans, David M. Eyers, Jean Bacon:
A model of information flow control to determine whether malfunctions cause the privacy invasion. MPM@EuroSys 2012: 2:1-2:6 - 2011
- [c87]Jean Bacon, Andrei Iu. Bejan, Alastair R. Beresford, David Evans, Richard J. Gibbens, Ken Moody:
Using Real-Time Road Traffic Data to Evaluate Congestion. Dependable and Historic Computing 2011: 93-117 - [c86]Jatinder Singh, David M. Eyers, Jean Bacon:
Disclosure control in multi-domain publish/subscribe systems. DEBS 2011: 159-170 - [c85]Jatinder Singh, Jean Bacon:
Managing Health Information Flows with a Reconfigurable Component-Based Middleware. Mobile Data Management (2) 2011: 52-54 - [c84]Petr Hosek, Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, David Evans, Brian Shand, Jean Bacon, Peter R. Pietzuch:
SafeWeb: A Middleware for Securing Ruby-Based Web Applications. Middleware 2011: 491-511 - 2010
- [c83]Ken Moody, Jean Bacon, David Evans, Scarlet Schwiderski-Grosche:
Implementing a Practical Spatio-Temporal Composite Event Language. From Active Data Management to Event-Based Systems and More 2010: 108-123 - [c82]Paris Kaimakis, Simon I. Hill, William J. Fitzgerald, Jean Bacon:
3D multi-car tracking based on monocular video. CIP 2010: 203-208 - [c81]Dan O'Keeffe, Jean Bacon:
Reliable complex event detection for pervasive computing. DEBS 2010: 73-84 - [c80]David M. Eyers, Luis Vargas, Jatinder Singh, Ken Moody, Jean Bacon:
Relational database support for event-based middleware functionality. DEBS 2010: 160-171 - [c79]Andrei Iu. Bejan, Richard J. Gibbens, David Evans, Alastair R. Beresford, Jean Bacon, Adrian Friday:
Statistical modelling and analysis of sparse bus probe data in urban areas. ITSC 2010: 1256-1263 - [c78]Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper). Middleware 2010: 293-312 - [c77]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
Distributed Middleware Enforcement of Event Flow Security Policy. Middleware 2010: 334-354 - [c76]Jatinder Singh, Pedro Brandão, Jean Bacon:
Context-aware disclosure of health sensor data. PervasiveHealth 2010: 1-4 - [c75]Dirk Trossen, Dana Pavel, Kenneth M. Guild, Jean Bacon, Jatinder Singh:
Information-centric pervasive healthcare platforms. PervasiveHealth 2010: 1-4 - [c74]David Evans, David M. Eyers, Jean Bacon:
Linking Policies to the Spatial Environment. POLICY 2010: 73-76 - [c73]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
DEFCON: High-Performance Event Processing with Information Security. USENIX ATC 2010 - 2009
- [c72]Pedro Brandão, Jean Bacon:
BSN Middleware - Abstracting Resources to Human Models. HEALTHINF 2009: 245-250 - [c71]Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand, David M. Eyers, Jean Bacon:
PrivateFlow: decentralised information flow control in event based middleware. DEBS 2009 - [c70]Pedro Brandão, Jean Bacon:
Body sensor networks: can we use them? M-MPAC@Middleware 2009: 3 - [c69]David M. Eyers, Ben Roberts, Jean Bacon, Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Event-processing middleware with information flow control. Middleware (Companion) 2009: 32 - 2008
- [c68]Luis Vargas, Jean Bacon, Ken Moody:
Event-Driven Database Information Sharing. BNCOD 2008: 113-125 - [c67]Jean Bacon, Alastair R. Beresford, David Evans, David Ingram, Niki Trigoni, Alexandre Guitton, Antonios Skordylis:
TIME: An Open Platform for Capturing, Processing and Delivering Transport-Related Data. CCNC 2008: 687-691 - [c66]Jean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch:
Access control in publish/subscribe systems. DEBS 2008: 23-34 - [c65]Jatinder Singh, Jean Bacon:
Event-Based Data Dissemination Control in Healthcare. eHealth 2008: 167-174 - [c64]Samuel Kounev, Kai Sachs, Jean Bacon, Alejandro P. Buchmann:
A Methodology for Performance Modeling of Distributed Event-Based Systems. ISORC 2008: 13-22 - [c63]Jatinder Singh, David M. Eyers, Jean Bacon:
Controlling historical information dissemination in publish/subscribe. Middleware Security 2008: 34-39 - [c62]Jatinder Singh, David M. Eyers, Jean Bacon:
Credential management in event-driven healthcare systems. Middleware (Companion) 2008: 48-53 - [c61]Jatinder Singh, Jean Bacon:
Event-based data control in healthcare. Middleware (Companion) 2008: 84-86 - [c60]Jatinder Singh, Luis Vargas, Jean Bacon:
A model for controlling data flow in distributed healthcare environments. PervasiveHealth 2008: 188-191 - [c59]David M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126 - [c58]Jatinder Singh, Luis Vargas, Jean Bacon, Ken Moody:
Policy-Based Information Sharing in Publish/Subscribe Middleware. POLICY 2008: 137-144 - 2007
- [c57]Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living. ARES 2007: 27-34 - [c56]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. DEBS 2007: 104-115 - [c55]Kai Sachs, Samuel Kounev, Jean Bacon, Alejandro P. Buchmann:
Workload Characterization of the SPECjms2007 Benchmark. EPEW 2007: 228-244 - [c54]Luis Vargas, Lauri I. W. Pesonen, Ehud Gudes, Jean Bacon:
Transactions in Content-Based Publish/Subscribe Middleware. ICDCS Workshops 2007: 68 - [c53]Ying Liu, Jean Bacon:
A Practical Synthesis of Dynamic Role Settings in Telecare Services. ICDS 2007: 5 - [c52]Ying Liu, Jean Bacon, Roger Wilson-Hinds:
On Smart-Care Services: Studies of Visually Impaired Users in Living Contexts. ICDS 2007: 32 - [c51]Salman Taherian, Jean Bacon:
State-Filters for Enhanced Filtering in Sensor-Based Publish/Subscribe Systems. MDM 2007: 346-350 - [c50]Salman Taherian, Jean Bacon:
SPS: a middleware for multi-user sensor systems. MPAC 2007: 19-24 - [c49]Eiko Yoneki, Jean Bacon:
eCube: Hypercube Event for Efficient Filtering in Content-Based Routing. OTM Conferences (2) 2007: 1244-1263 - 2006
- [c48]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. SAINT 2006: 222-228 - [c47]Luis Vargas, Jean Bacon, Ken Moody:
Transactions in Distributed Event-Based Middleware. CEC/EEE 2006: 53 - 2005
- [c46]Lauri I. W. Pesonen, Jean Bacon:
Secure event types in content-based, multi-domain publish/subscribe systems. SEM 2005: 98-105 - [c45]Eiko Yoneki, Jean Bacon:
Object Tracking Using Durative Events. EUC Workshops 2005: 652-662 - [c44]Eiko Yoneki, Jean Bacon:
Ubiquitous Computing: Challenges in Flexible Data Aggregation. EUC 2005: 1189-1200 - [c43]Luis Vargas, Jean Bacon, Ken Moody:
Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005: 392-397 - [c42]Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody:
Risk Models for Trust-Based Access Control(TBAC). iTrust 2005: 364-371 - [c41]Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20 - [c40]Eiko Yoneki, Jean Bacon:
Unified Semantics for Event Correlation over Time and Space in Hybrid Network Environments. OTM Conferences (1) 2005: 366-384 - [c39]Eiko Yoneki, Jean Bacon:
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments. PerCom Workshops 2005: 91-96 - [c38]Eiko Yoneki, Jean Bacon:
Dynamic group communication in mobile peer-to-peer environments. SAC 2005: 986-992 - [c37]Eiko Yoneki, Jean Bacon:
Distributed multicast grouping for publish/subscribe over mobile ad hoc networks. WCNC 2005: 2293-2299 - 2004
- [c36]Eiko Yoneki, Jean Bacon:
Content-Based Routing with On-Demand Multicast. ICDCS Workshops 2004: 788-793 - [c35]Salman Taherian, Dan O'Keeffe, Jean Bacon:
Event dissemination in mobile wireless sensor networks. MASS 2004: 573-575 - [c34]Eiko Yoneki, Jean Bacon:
Dynamic Publish/Subscribe in Mobile Peer-to-Peer Systems. OTM Workshops 2004: 1-2 - [c33]Eiko Yoneki, Jean Bacon:
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment. OTM Workshops 2004: 198-210 - [c32]Eiko Yoneki, Jean Bacon:
An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks. PerCom Workshops 2004: 92-97 - [c31]Steve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong:
An architecture for supporting vicarious learning in a distributed environment. SAC 2004: 963-970 - [c30]Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody:
Using trust and risk in role-based access control policies. SACMAT 2004: 156-162 - 2003
- [c29]Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody:
Persistent versus Dynamic Role Membership. DBSec 2003: 344-357 - [c28]András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody:
Role-based access control for publish/subscribe middleware architectures. DEBS 2003 - [c27]Peter R. Pietzuch, Jean Bacon:
Peer-to-peer overlay broker networks in an event-based middleware. DEBS 2003 - [c26]Eiko Yoneki, Jean Bacon:
Gateway: A Message Hub with Store-and-Forward Messaging in Mobile Networks. ICDCS Workshops 2003: 348-353 - [c25]Peter R. Pietzuch, Brian Shand, Jean Bacon:
A Framework for Event Composition in Distributed Systems. Middleware 2003: 62-82 - [c24]Brian Shand, Nathan Dimmock, Jean Bacon:
Trust for Ubiquitous, Transparent Collaboration. PerCom 2003: 153-160 - 2002
- [c23]Peter R. Pietzuch, Jean Bacon:
Hermes: A Distributed Event-Based Middleware Architecture. ICDCS Workshops 2002: 611-618 - [c22]Brian Shand, Jean Bacon:
Policies in Accountable Contracts. POLICY 2002: 80-91 - [c21]Alan S. Abrahams, David M. Eyers, Jean Bacon:
An asynchronous rule-based approach for business process automation using obligations. ACM SIGPLAN Workshop on Rule-Based Programming 2002: 93-103 - [c20]Alan S. Abrahams, David M. Eyers, Jean Bacon:
A Coverage-Determination Mechanism for Checking Business Contracts against Organizational Policies. TES 2002: 97-106 - 2001
- [c19]Jean Bacon, Ken Moody, Walt Yao:
Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001: 295-310 - [c18]Jean Bacon, Michael Lloyd, Ken Moody:
Translating Role-Based Access Control Policy within Context. POLICY 2001: 107-119 - [c17]Walt Yao, Ken Moody, Jean Bacon:
A model of OASIS role-based access control and its support for active security. SACMAT 2001: 171-181 - 2000
- [c16]John H. Hine, Walt Yao, Jean Bacon, Ken Moody:
An Architecture for Distributed OASIS Services. Middleware 2000: 104-120 - [c15]Jean Bacon, Alexis Hombrecher, Chaoying Ma, Ken Moody, Walt Yao:
Event Storage and Federation Using ODMG. POS 2000: 265-281 - 1998
- [c14]Chaoying Ma, Jean Bacon:
COBEA: A CORBA-Based Event Architecture. COOTS 1998: 117-132 - [c13]John Bates, Jean Bacon, Ken Moody, Mark D. Spiteri:
Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998: 58-65 - [c12]Richard Hayton, Jean Bacon, Ken Moody:
Access Control in an Open Distributed Environment. S&P 1998: 3-14 - [c11]John Bates, Mark D. Spiteri, David Halls, Jean Bacon:
Integrating Real-World and Computer-Supported Collaboration in the Presence of Mobility. WETICE 1998: 256-261 - 1996
- [c10]Feng Huang, Jean Bacon:
Operating System Support for Flexible Coherence in Distributed Shared Memory. HICSS (1) 1996: 92-101 - [c9]Richard Hayton, Jean Bacon, John Bates, Ken Moody:
Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996: 9-16 - [c8]David Halls, John Bates, Jean Bacon:
Flexible distributed programming using mobile code. ACM SIGOPS European Workshop 1996: 225-231 - 1995
- [c7]Zhixue Wu, Ken Moody, Jean Bacon, Robert J. Stroud:
Data consistency in a distributed persistent object system. HICSS (2) 1995: 635-644 - 1994
- [c6]John Bates, Jean Bacon:
A Development Platform for Multimedia Applications in a Distributed, ATM Network Environment. ICMCS 1994: 154-163 - [c5]Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody:
Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994: 141-146 - 1989
- [c4]Jean Bacon, Ian M. Leslie, Roger M. Needham:
Distributed Computing with a Processor Bank. Process in Distributed Operating Systems and Distributed Systems Management 1989: 147-161 - [c3]Jean Bacon:
Extending Distributed Operating Systems to Manageable Large Scale Distributed Processing Environments. Process in Distributed Operating Systems and Distributed Systems Management 1989: 203 - 1988
- [c2]Jean Bacon:
Autonomy or interdependence in distributed systems: position paper. ACM SIGOPS European Workshop 1988 - 1986
- [c1]Jean Bacon:
Mayflower: a distributed, object-oriented programming system. ACM SIGOPS European Workshop 1986
Parts in Books or Collections
- 2010
- [p2]Jean Bacon, David M. Eyers, Jatinder Singh:
Securing Event-Based Systems. Principles and Applications of Distributed Event-Based Systems 2010: 119-139 - [p1]Annika Hinze, Jean Bacon, Alejandro P. Buchmann, Sharma Chakravarthy, Mani Chandi, Avigdor Gal, Dieter Gawlick, Richard Tibbetts:
Panel. Principles and Applications of Distributed Event-Based Systems 2010: 432-454
Editorship
- 2010
- [e4]Jean Bacon, Peter R. Pietzuch, Joe Sventek, Ugur Çetintemel:
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010. ACM 2010, ISBN 978-1-60558-927-5 [contents] - 2009
- [e3]Jean Bacon, Brian F. Cooper:
Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30 - December 4, 2009. Proceedings. Lecture Notes in Computer Science 5896, Springer 2009, ISBN 978-3-642-10444-2 [contents] - [e2]Roy H. Campbell, Jean Bacon, Brian F. Cooper:
Middleware 2009, ACM/IFIP/USENIX 10th International Middleware Conference, Urbana, IL, USA, November 30 - December 4, 2009, Companion Proceedings. ACM 2009 [contents] - 1998
- [e1]Paulo Guedes, Jean Bacon:
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, Sintra, Portugal, 7-10 September 1998. ACM 1998 [contents]
Reference Works
- 2006
- [r1]Jean Bacon, Eiko Yoneki:
Openness and Interoperability in Mobile Middleware. The Handbook of Mobile Middleware 2006: 487-518
Informal and Other Publications
- 2019
- [i6]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance. CoRR abs/1904.00156 (2019) - 2018
- [i5]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - 2017
- [i4]Raluca Diaconu, Jean Bacon, Jie Deng, Jatinder Singh:
ComFlux: External Composition and Adaptation of Pervasive Applications. CoRR abs/1710.06711 (2017) - [i3]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical Whole-System Provenance Capture. CoRR abs/1711.05296 (2017) - 2016
- [i2]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon:
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud. Tiny Trans. Comput. Sci. 4 (2016) - 2015
- [i1]Thomas F. J.-M. Pasquier, Jatinder Singh, David M. Eyers, Jean Bacon:
CamFlow: Managed Data-sharing for Cloud Services. CoRR abs/1506.04391 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint