Thomas Pasquier, « Déloyauté probatoire et pouvoir de l'employeur : une liaison dangereuse », Recueil Dalloz, Dalloz , 2024, n°06, p. 296
Thomas Pasquier, Barbara Lerner, Emery Boose, Orenna Brand, Aaron M. Ellison [et alii], « Making Provenance Work for You », The R Journal, , 2023
Thomas Pasquier, Ana Trisovic, Matthew K. Lau, Mercè Crosas, « A large-scale study on research code quality and execution », Scientific Data, , 2022
Thomas Pasquier, « L'arrêt Uber - Une décision a-disruptive », Actualité juridique Contrats d'affaires : concurrence, distribution, Dalloz , 2020, n°5, pp. 227-234
Thomas Pasquier, « Travailleurs de plateforme et charte sociale : un régime en clair-obscur »: À propos de l'article 44 de la loi n° 2019-1428 du 24 décembre 2019 d'orientation des mobilités et de la décision du Conseil constitutionnel n° 2019-794 DC du 20 décembre 2019, Actualité juridique Contrats d'affaires : concurrence, distribution, Dalloz , 2020, n°2, pp. 60-68
Thomas Pasquier, Matthew Lau, Thomas F. J.-M. Pasquier, Margo Seltzer, « Rclean: A Tool for Writing Cleaner, More Transparent Code », Journal of Open Source Software, , 2020
Thomas Pasquier, « La diversification des contrôles de conventionnalité des lois en matière de barème d'indemnisation », Revue de droit du travail, Dalloz , 2019, n°11, p. 683
Thomas Pasquier, « Les plateformes numériques dans la tourmente : à propos de l’arrêt Uber rendu par la Cour d’appel de Paris le 10 janvier 2019 », Semaine sociale Lamy, Editions Lamy/Wolkers Kluwer France, 2019, n°1845, p. 6
Thomas Pasquier, David Eyers, Jean Bacon, « Viewpoint | Personal Data and the Internet of Things », Communications of the ACM, , 2019
The Internet of Things promises a connected environment reacting to and addressing our every need, but based on the assumption that all of our movements and words can be recorded and analysed to achieve this end. Ubiquitous surveillance is also a precondition for most dystopian societies, both real and fictional. How our personal data is processed and consumed in an ever more connected world must imperatively be made transparent, and more effective technical solutions than those currently on offer, to manage personal data must urgently be investigated.
Thomas Pasquier, « Les nouveaux visages de la loyauté dans la négociation collective », Revue de droit du travail, Dalloz , 2018, p. 741
Thomas Pasquier, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara S. Lerner [et alii], « Sharing and preserving computational analyses for posterity with encapsulator », Computing in Science and Engineering, , 2018
Open data and open source software might be part of the solution to sciences reproducibility crisis, but they are insufficient to guarantee reproducibility. Requiring minimal end-user expertise, the encapsulator system creates a time capsule with reproducible code in a self-contained computational environment. encapsulator provides end users with a fully featured desktop environment for reproducible research.
Thomas Pasquier, « Le cheval et le droit », Actualité juridique Contrats d'affaires : concurrence, distribution, Dalloz , 2017, n°7, pp. 307--
Thomas Pasquier, Matthew Lau, Ana Trisovic, Emery Boose, Ben Couturier [et alii], « If these data could talk », Scientific Data, Nature Publishing Group, 2017, p. 170114
Thomas Pasquier, « Sens et limites de la qualification de contrat de travail : de l’arrêt Formacad aux travailleurs uberisés », Revue de droit du travail, Dalloz , 2017, n°2, pp. 95-115
Thomas Pasquier, « Le droit social confronté aux défis de l’ubérisation », Dalloz IP/IT : droit de la propriété intellectuelle et du numérique, Éditions Dalloz , 2017, p. 368
Thomas Pasquier, Thomas F. J.-M. Pasquier, Jatinder Singh, David Eyers, Jean Bacon, « Camflow: Managed Data-Sharing for Cloud Services », IEEE Transactions on Cloud Computing, , 2017
Thomas Pasquier, Jean Bacon, Jatinder Singh, David Eyers, « CloudSafetyNet », Impact, , 2017
Thomas Pasquier, Jatinder Singh, Julia Powles, David Eyers, Margo Seltzer [et alii], « Data provenance to audit compliance with privacy policy in the Internet of Things », Personal and Ubiquitous Computing, , 2017
Thomas Pasquier, Jatinder Singh, Jean Bacon, Hajoon Ko, David Eyers, « Twenty security considerations for cloud-supported Internet of Things », IEEE Internet of Things Journal, , 2016
To realize the broad vision of pervasive computing, underpinned by the 'Internet of Things' (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends toward the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy, and personal safety risks that arise beyond these subsystems; i.e., from the wide-scale, cross-platform openness that cloud services bring to IoT. In this paper, we focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyze the current state of cloud-supported IoT to make explicit the security considerations that require further work.
Thomas Pasquier, « Le préjudice à la croisée des chemins », Revue de droit du travail, Dalloz , 2015, n°12, p. 741
Thomas Pasquier, « Neutralité et impartialité devant le conseil de prud'hommes », Revue de droit du travail, Dalloz , 2015, n°04, p. 275
Thomas Pasquier, Jatinder Singh, Julia Powles, Jean Bacon, « Data Flow Management and Compliance in Cloud Computing », IEEE Cloud Computing Magazine, , 2015
As cloud computing becomes an increasingly dominant means of providing computing resources, legal and regulatory issues associated with the cloud also become more pronounced. In particular, there is a heightened focus on ensuring the privacy and integrity of users' personal data. At present, the cloud is opaque, a black box. The technical means for enforcing and demonstrating compliance with data management practices lag behind legal and regulatory aspirations. Information flow control (IFC) enables auditable, fine-grained management as data moves throughout systems. IFC offers the potential to improve the visibility and control over data flows within and between cloud services and cloud-hosted applications. The authors use real-world legal/regulatory examples to show how IFC can help satisfy data management obligations and improve the accountability of responsible parties.
Thomas Pasquier, « CamFlow: Managed Data-Sharing for Cloud Services », IEEE Transactions on Cloud Computing, , 2015
Thomas Pasquier, « Faut-il caler le temps de la justice sur celui de l'entreprise ? », Revue de droit du travail, Dalloz , 2014, n°03, p. 153
Thomas Pasquier, « FlowK: Information Flow Control for the Cloud », IEEE 6th International Conference on Cloud Computing Technology and Science, , 2014
Thomas Pasquier, Jean Bacon, David Eyers, Jatinder Singh, Ioannis Papagiannis [et alii], « Information Flow Control for Secure Cloud Computing », IEEE Transactions on Network and System Management, SI Cloud Service Management, , 2014
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. The earliest IFC models targeted security in a centralised environment, but decentralised forms of IFC have been designed and implemented, often within academic research projects. As a result, there is potential for decentralised IFC to achieve better cloud security than is available today. In this paper we describe the properties of cloud computing - Platform-as-a-Service clouds in particular - and review a range of IFC models and implementations to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked to the data that it protects, both tenants and providers of cloud services can agree on security policy, in a manner that does not require them to understand and rely on the particulars of the cloud software stack in order to effect enforcement.
Thomas Pasquier, « Réviser les objectifs salariaux », Revue de droit du travail, Dalloz , 2013, n°02, p. 82
Thomas Pasquier, « Le terme de la suspension du contrat de travail et la visite en vue de la reprise du travail », Revue de droit du travail, Dalloz , 2011, n°03, p. 177
Thomas Pasquier, Georges Borenfreund, Emmanuel Dockès, Olivier Leclerc, Elsa Peskine [et alii], « Panorama Droit du travail (septembre 2010-décembre 2010) », Recueil Dalloz, Dalloz , 2011, n°18, pp. 1246-1257
Thomas Pasquier, Georges Borenfreund, Olivier Leclerc, Elsa Peskine, Jérôme Porta [et alii], « Panorama Droit du travail (septembre 2009-décembre 2009) », Recueil Dalloz, Dalloz , 2010, n°11, pp. 672-681
Thomas Pasquier, « De l'exercice du pouvoir en matière d'inaptitude », Revue de droit du travail, Dalloz , 2009, n°12, p. 710
Thomas Pasquier, « La vente entre époux et l'économie de la participation aux acquêts », Recueil Dalloz, Dalloz , 2009, n°37, p. 2528
Thomas Pasquier, « La révision des objectifs déraisonnables », Recueil Dalloz, Dalloz , 2009, n°28, p. 1931
Thomas Pasquier, Georges Borenfreund, Olivier Leclerc, Elsa Peskine, Jérôme Porta [et alii], « Panorama Droit du travail (septembre 2008-décembre 2008) », Recueil Dalloz, Dalloz , 2009, n°9, pp. 590-599
Thomas Pasquier, « Les nouvelles frontières du travail subordonné, Approche pluridisciplinaire », Revue de droit du travail, Dalloz , 2006, n°0203, p. 135
Thomas Pasquier, « L'externalisation et l'article L. 120-3 du code du travail », Recueil Dalloz, Dalloz , 2004, n°06, p. 383
Thomas Pasquier, « La détermination de l'employeur dans une relation de travail triangulaire : l'émergence du critère du profit ? », Recueil Dalloz, Dalloz , 2003, n°06, p. 393
Thomas Pasquier, Nichole Boufford, Joseph Wonsil, Adam Pocock, Jack Sullivan [et alii], « SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions », le 01 janvier 2024
Thomas Pasquier, « Politisations et émancipations à l’âge des révolutions, 1770-1830 », le 24 mars 2023
Organisé par la Société des études robespierristes et l'IRHIS, Université Paris 1 Panthéon Sorbonne
Thomas Pasquier, « Travailler pour quelqu’un : indépendance, subordination, bénévolat », le 23 février 2023
Organisée par l'Institut Jean Carbonnier, Université de Poitiers dans le cadre des Vespérales de l’Institut Jean Carbonnier, Cycle "Les représentations en droit du travail"
Thomas Pasquier, Soo Yee Lim, Xueyuan Han, « Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing », le 01 janvier 2023
Thomas Pasquier, Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar [et alii], « PACED: Provenance-based Automated Container Escape Detection », le 01 janvier 2022
Thomas Pasquier, « Quel(s) droit(s) du travail pour les travailleurs des plateformes numériques », le 31 mars 2021
Organisé par l’équipe du Master de Droit Social, Université Paris-Nanterre
Thomas Pasquier, Soo Yee Lim, Bogdan Stelea, Xueyuan Han, « SIGL: Securing Software Installations Through Deep Graph Learning », le 01 janvier 2021
Thomas Pasquier, « Les mutations de la figure du travailleur au prisme de l’internationalisation du droit du travail », le 04 décembre 2020
Colloque en ligne organisé par le LEJEP de CY Cergy Paris Université et l'IRERP de l'Université Paris Nanterre
Thomas Pasquier, « L’émergence d'un droit des plateformes », le 21 octobre 2020
Organisé par l’Equipe de recherche Louis Josserand, sous la direction scientifique de Xavier Delpech, Professeur associé, Université́ Jean Moulin Lyon 3, Centre de droit de l’entreprise
Thomas Pasquier, « Repenser le travail en prison - Contenu, organisation et droits des travailleurs en prison », le 27 février 2020
Organisé par l’IFG, Université de Lorraine, le Comptrasec, Université de Bordeaux - CNRS, l'IRERP, Université Paris Nanterre, et le CERCRID, Université Jean-Monnet Saint-Etienne - CNRS.
Thomas Pasquier, Xueyuan Han, Adam Bates, James Mickens, Margo Seltzer [et alii], « Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution », le 01 janvier 2020
Advanced Persistent Threats (APTs) are difficult to detect due to their low-and-slow attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. From modeling to detection, UNICORN tailors its design specifically for the unique characteristics of APTs. Through extensive yet time-efficient graph analysis, UNICORN explores provenance graphs that provide rich contextual and historical information to identify stealthy anomalous activities without pre-defined attack signatures. Using a graph sketching technique, it summarizes long-running system execution with space efficiency to combat slow-acting attacks that take place over a long time span. UNICORN further improves its detection capability using a novel modeling approach to understand long-term behavior as the system evolves. Our evaluation shows that UNICORN outperforms an existing state-of-the-art APT detection system and detects real-life APT scenarios with high accuracy.
Thomas Pasquier, « Discriminations, santé et conflictualité au travail », le 07 novembre 2019
1ère Journée d’études « DISPROSAC » organisé par l’IETL, Lyon 2
Thomas Pasquier, « Dynamique (s) et devenir (s) du travail humain », le 26 juin 2019
Organisées par l'Institut d'Etudes du Travail de Lyon
Thomas Pasquier, « Données numériques, plateformes et transports », le 14 mars 2019
Organisée par l’Université Lumière Lyon 2
Thomas Pasquier, « Les barèmes d'indemnisation dans la tourmente ? Mythe et réalité », le 28 février 2019
Conférence-débat du cycle « Les séances d'actualité de l'IETL » organisée par l'Institut d'Etudes du Travail de Lyon et l'équipe "Mutations du travail et des organisations en temps de crise" du CERCRID (UMR 5137)
Thomas Pasquier, David Eyers, Margo Seltzer, Ayat Fekry, Lucian Carata [et alii], « Towards Seamless Configuration Tuning of Big Data Analytics », le 01 janvier 2019
The execution of distributed data processing workloads (such as those running on top of Hadoop or Spark) in cloud environments presents a unique opportunity to explore multiple trade-offs between elasticity (and types of resources being allocated), overall runtime and total costs. However, beyond high-level constraints and objectives, it's not the end-users who should be mainly concerned with those optimizations, but the cloud providers. They have both the vantage point to collect actionable information, economies of scale and position to adjust parameters when dynamic conditions change, in order to fulfil SLOs that go beyond classic measures of latency and throughput.This is at odds with the existing approach of making software (including the interfaces to the cloud and the processing frameworks) as configurable as possible. We propose that rather than configurability, self-tunability (or the illusion of it as far as the end-user is concerned) is a better long-term goal.
Thomas Pasquier, « Travail et innovations technologiques », le 02 juillet 2018
Thomas Pasquier, « Quelle place pour les salariés dans l'entreprise ? », le 28 juin 2018
Organisé par l'équipe "Mutations du travail et des organisations en temps de crise" du CERCRID (CEntre de Recherches CRItiques sur le Droit)
Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant [et alii], « Runtime Analysis of Whole-System Provenance », The 25th ACM Conference on Computer and Communications Security, Toronto Canada (CA), le 15 octobre 2018
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes. Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place only retrospectively. Such post-hoc analysis is insufficient for realtime security applications; moreover, even for forensic tasks, prior provenance collection systems exhibited poor performance and scalability, jeopardizing the timeliness of query responses. We present CamQuery, which provides inline, realtime provenance analysis, making it suitable for implementing security applications. CamQuery is a Linux Security Module that offers support for both userspace and in-kernel execution of analysis applications.We demonstrate the applicability of CamQuery to a variety of runtime security applications including data loss prevention, intrusion detection, and regulatory compliance. In evaluation, we demonstrate that CamQuery reduces the latency of realtime query mechanisms, while imposing minimal overheads on system execution. CamQuery thus enables the further deployment of provenance-based technologies to address central challenges in computer security.
Thomas Pasquier, « Autour des ordonnances Macron : Le droit du travail en changement, essai de mesure - Le nouveau droit des ruptures du contrat de travail », le 23 novembre 2017
Organisé par de l'équipe "Mutations du travail et des organisations en temps de crise" du CERCRID (UMR 5137)
Thomas Pasquier, « Un salaire minimum pour l’Europe ? », le 16 novembre 2017
Organisée par l’Université de Bordeaux, le GEFACT, le CIERA et le COMPTRASEC
Thomas Pasquier, David Eyers, Jean Bacon, « PHP2Uni: Building Unikernels Using Scripting Language Transpilation », le 01 janvier 2017
Thomas Pasquier, « L'ubérisation », le 02 décembre 2016
Sous la direction scientifique de Mme Nathalie Martial-Braz, avec la participation des Master 2 Droit et Obligations Civiles et Commerciales, et Droit des Activités Numériques
Thomas Pasquier, Jean Bacon, Jatinder Singh, David Eyers, Hajoon Ko [et alii], « Information Flow Audit for Transparency and Compliance in the Handling of Personal Data », le 01 janvier 2016
Information Flow Control (IFC) extends conventional access control beyond application boundaries, and allows control of data flows after a point of authorised data disclosure. In a deployment of IFC within a cloud operating system (OS), the IFC implementation can be trusted by applications running over the same OS instance. In an IFC deployment within a widely distributed system, such as in the Internet of Things, the potential for trustworthy enforcement of IFC must be ascertained during connection establishment. IFC is based on tagging data in line with data management requirements. When audit is included as part of IFC, it can be shown that a system complies with these requirements. In this paper, we consider the possibility that some tags may be sensitive and discuss the use of Private Set Intersection (PSI) to prevent unnecessary disclosure of IFC tags during the establishment of communication channels. The proposed approach guarantees that on authorised flows, only the tags necessary for that interaction are disclosed and that no tags are disclosed for prevented flows. This functionality is particularly important in contexts such as healthcare, where privacy and confidentiality are paramount.
Thomas Pasquier, Jatinder Singh, Jean Bacon, Olivier Hermant, « Managing Big Data with Information Flow Control », 8th IEEE International Conference on Cloud Computing (CLOUD 2015), New York United States (US), le 27 juin 2015
Concern about data leakage is holding back more widespread adoption of cloud computing by companies and public institutions alike. To address this, cloud tenants/applications are traditionally isolated in virtual machines or containers. But an emerging requirement is for cross-application sharing of data, for example, when cloud services form part of an IoT architecture. Information Flow Control (IFC) is ideally suited to achieving both isolation and data sharing as required. IFC enhances traditional Access Control by providing continuous, data-centric, cross-application, end-to-end control of data flows. However, large-scale data processing is a major requirement of cloud computing and is infeasible under standard IFC. We present a novel, enhanced IFC model that subsumes standard models. Our IFC model supports 'Big Data' processing, while retaining the simplicity of standard IFC and enabling more concise, accurate and maintainable expression of policy.
Thomas Pasquier, Jean Bacon, Brian Shand, « FlowR: aspect oriented programming for information flow control in ruby », le 01 janvier 2014
This paper reports on our experience with providing Information Flow Control (IFC) as a library. Our aim was to support the use of an unmodified Platform as a Service (PaaS) cloud infrastructure by IFC-aware web applications. We discuss how Aspect Oriented Programming (AOP) overcomes the limitations of RubyTrack, our first approach. Although use of AOP has been mentioned as a possibility in past IFC literature we believe this paper to be the first illustration of how such an implementation can be attempted. We discuss how we built FlowR (Information Flow Control for Ruby), a library extending Ruby to provide IFC primitives using AOP via the Aquarium open source library. Previous attempts at providing IFC as a language extension required either modification of an interpreter or significant code rewriting. FlowR provides a strong separation between functional implementation and security constraints which supports easier development and maintenance; we illustrate with practical examples. In addition, we provide new primitives to describe IFC constraints on objects, classes and methods that, to our knowledge, are not present in related work and take full advantage of an object oriented language (OO language). The experience reported here makes us confident that the techniques we use for Ruby can be applied to provide IFC for any Object Oriented Program (OOP) whose implementation language has an AOP library.
Thomas Pasquier, Frédéric Lasserre, T. Pasquier, Guillaume Haiat, Pierre Calmon [et alii], « Helped positioning by using a simulation tool for qualification of PWR vessel examination technique », 4th International Conference on NDE in relation to structural integrity for nuclear and pressurized components, London United Kingdom (GB), le 06 décembre 2004
Thomas Pasquier, « Practical whole-system provenance capture », le 30 novembre -0001