Adam Macneil Bates

20122019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 40 Similar Profiles
Data privacy Engineering & Materials Science
Access control Engineering & Materials Science
Watermarking Engineering & Materials Science
Metadata Engineering & Materials Science
Cloud computing Engineering & Materials Science
Communication Engineering & Materials Science
Firmware Engineering & Materials Science
Hardware Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 14 Conference contribution
  • 6 Article

Can Data Provenance Put an End to the Data Breach?

Bates, A. M. & Hassan, W. U., Jul 1 2019, In : IEEE Security and Privacy. 17, 4, p. 88-93 6 p., 8755956.

Research output: Contribution to journalArticle

Looms
Personnel
credit system
personnel management
resignation

Emerging threats in internet of things voice services

Kumar, D., Paccagnella, R., Murley, P., Hennenfent, E., Mason, J., Bates, A. M. & Bailey, M. D., Jul 1 2019, In : IEEE Security and Privacy. 17, 4, p. 18-24 7 p., 8718807.

Research output: Contribution to journalArticle

Speech recognition
threat
Engines
Internet
interpretation

AliDrone: Enabling trustworthy proof-of-alibi for commercial drone compliance

Liu, T., Hojjati, A., Bates, A. M. & Nahrstedt, K., Jul 19 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 841-852 12 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unmanned aerial vehicles (UAV)
Network protocols
Compliance
Drones
Program processors

A provenance model for the european union general data protection regulation

Ujcich, B. E., Bates, A. & Sanders, W. H., Jan 1 2018, Provenance and Annotation of Data and Processes - 7th International Provenance and Annotation Workshop, IPAW 2018, Proceedings. Belhajjame, K., Gehani, A. & Alper, P. (eds.). Springer-Verlag, p. 45-57 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11017 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Provenance
Union
Model
Compliance

Cross-app poisoning in software-defined networking

Ujcich, B. E., Jero, S., Edmundson, A., Wang, Q., Skowyra, R., Landry, J., Bates, A. M., Sanders, W. H., Nita-Rotaru, C. & Okhravi, H., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 648-663 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Application programs
Flow control
Access control
Controllers