Professor Ryan Ko

Chair & Director - Cyber Security

School of Information Technology and Electrical Engineering
Faculty of Engineering, Architecture and Information Technology
ryan.ko@uq.edu.au
+61 7 336 51092

Overview

Professor Ryan Ko is Chair and Director of UQ Cyber Security at the University of Queensland, Australia. His applied research in cyber security focuses on 'returning control of data to cloud computing users'. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, and (2) privacy-preserving data processing (homomorphic encryption). Both his research foci are recognised nationally and internationally, receiving conference Best Paper Awards (2011, 2015, 2017), and technology transfers locally and internationally.

He serves as Technology Advisory Board member of the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC), Nyriad, and expert advisor to INTERPOL, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and one of four nationally-appointed Technical Adviser for the Harmful Digital Communications Act 2015, Ministry of Justice.

Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million) from 2014 to 2018. STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.

Prof Ko has a strong record in establishing university-wide, multi-disciplinary academic research and education programmes, including NZ's first cyber security graduate research programme and lab (CROW) in 2012, NZ's first Master of Cyber Security (encompassing technical and law courses), the NZ Cyber Security Challenge since 2014, and the New Zealand Institute for Security and Crime Science – Te Puna Haumaru, the Evidence Based Policing Centre (at Wellington with NZ Police and ESR), and Master of Security and Crime Science in 2017. The Institute integrates research expertise across 6 faculties, covering computer science, statistics, psychology, crime science, Maori and indigenous studies, law, management, and social science.

Within the ISO/IEC JTC 1/SC 27 technical committee, Prof Ko served as Editor, ISO/IEC 21878 “Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, New Zealand, in 2017.

Ko serves in the MBIE College of Assessors (since 2015) as lead assessor and assessor for the Endeavour Fund and Catalyst Fund proposals, and have externally examined 8 PhD and 2 Masters theses. He has published more than 100 publications, including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT). He served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and series editor for Elsevier's security books.

Ko has a track record developing international and national cyber security curricula, including the co-creation of the gold-standard (ISC)2 Certified Cloud Security Professional (CCSP) curriculum (2014-2015), and authoring the initial draft of the NZQA's Level 6 Cybersecurity Diploma qualification as part of the NZ Cyber Security Skills Taskforce.

He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has spoken regularly on cyber and cloud security research across the globe, including the Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).

For his contributions to the field, he was elected Fellow of Cloud Security Alliance (CSA) (2016), the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018), and awarded the inaugural CSA Ron Knode Service Award 2012. For his research and teaching excellence, he was awarded the University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.

Qualifications

  • Doctor of Philosophy, Nanyang Technological University

Publications

  • Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018) ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers Geneva, Switzerland: ISO

  • Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017) A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, . doi:10.1109/tdsc.2017.2703626

  • Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. In: Guojun Wang, Mohammed Atiquzzaman, Zheng Yan and Kim-Kwang Raymond Choo, Security, privacy, and anonymity in computation, communication, and Storage - SpaCCS 2017 International Workshops, proceedings. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, (180-193). 12-15 December 2017. doi:10.1007/978-3-319-72395-2_18

  • Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. In: 2016 IEEE Trustcom/BigDataSE/ISPA. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (900-908). 23-26 August 2016. doi:10.1109/TrustCom.2016.153

  • Ko, Ryan K. L. (2014). Data accountability in cloud systems. In Surya Nepal and Mukaddim Pathan (Ed.), Security, privacy and trust in cloud systems (pp. 211-238) Heidelberg, Germany: Springer. doi:10.1007/978-3-642-38586-5_7

View all Publications

Publications

Featured Publications

  • Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018) ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers Geneva, Switzerland: ISO

  • Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017) A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, . doi:10.1109/tdsc.2017.2703626

  • Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. In: Guojun Wang, Mohammed Atiquzzaman, Zheng Yan and Kim-Kwang Raymond Choo, Security, privacy, and anonymity in computation, communication, and Storage - SpaCCS 2017 International Workshops, proceedings. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, (180-193). 12-15 December 2017. doi:10.1007/978-3-319-72395-2_18

  • Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. In: 2016 IEEE Trustcom/BigDataSE/ISPA. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (900-908). 23-26 August 2016. doi:10.1109/TrustCom.2016.153

  • Ko, Ryan K. L. (2014). Data accountability in cloud systems. In Surya Nepal and Mukaddim Pathan (Ed.), Security, privacy and trust in cloud systems (pp. 211-238) Heidelberg, Germany: Springer. doi:10.1007/978-3-642-38586-5_7

Book

Book Chapter

  • Yu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2019). Data provenance in cloud. In Vimal Kumar, Sivadon Chaisiri and Ryan Ko (Ed.), Data security in cloud computing (pp. 261-275) London, United Kingdom: Institution of Engineering and Technology. doi:10.1049/pbse007e_ch12

  • Phua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. In Encyclopedia of Big Data Technologies (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-63962-8_237-1

  • Kumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. In Data security in cloud computing (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi:10.1049/pbse007e_ch1

  • Will, Mark A. and Ko, Ryan K. (2017). Distributing encoded data for private processing in the cloud. In Vimal Kumar, Sivadon Chaisiri and Ryan Ko (Ed.), Data security in cloud computing (pp. 89-115) London, United Kingdom: The Institution of Engineering and Technology. doi:10.1049/pbse007e_ch5

  • Garae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. In Vimal Kumar , Sivadon Chaisiri and Ryan Ko (Ed.), Data security in cloud computing (pp. 277-295) London, United Kingdom: Institution of Engineering and Technology. doi:10.1049/pbse007e_ch13

  • Scoon, Craig and Ko, Ryan K. (2017). The Waikato Data Privacy Matrix. In Vimal Kumar, Sivadon Chaisiri and Ryan Ko (Ed.), Data security in cloud computing (pp. 243-259) London, United Kingdom: The Institution of Engineering and Technology. doi:10.1049/pbse007e_ch11

  • Garae, Jeffery and Ko, Ryan K. L. (2017). Visualization and Data Provenance Trends in Decision Support for Cybersecurity. In Data Analytics and Decision Support for Cybersecurity (pp. 243-270) Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-59439-2_9

  • Will, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. In Ryan Ko and Kim-Kwang Raymond Choo (Ed.), The cloud security ecosystem: technical, legal, business and management issues (pp. 101-127) Waltham, MA USA: Elsevier. doi:10.1016/B978-0-12-801595-7.00005-7

  • Ko, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. In Ryan Ko and Kim-Kwang Raymond Choo (Ed.), The cloud security ecosystem: technical, legal, business and management issues (pp. 1-14) Waltham, MA USA: Elsevier. doi:10.1016/B978-0-12-801595-7.00001-X

  • Tan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 171-185) Waltham, MA United States: Elsevier. doi:10.1016/B978-0-12-801595-7.00008-2

  • Delamore, Baden and Ko, Ryan K. L. (2015). Security as a service (SecaaS)—An overview. In The Cloud Security Ecosystem (pp. 187-203) Waltham, MA United States: Elsevier. doi:10.1016/b978-0-12-801595-7.00009-4

  • Ko, Ryan K. L. (2014). Data accountability in cloud systems. In Surya Nepal and Mukaddim Pathan (Ed.), Security, privacy and trust in cloud systems (pp. 211-238) Heidelberg, Germany: Springer. doi:10.1007/978-3-642-38586-5_7

Journal Article

Conference Publication

  • Garae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, (639-650). 31 July - 3 August 2018. doi:10.1109/TrustCom/BigDataSE.2018.00095

  • Scarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. In: ICPC '18 Proceedings of the 26th Conference on Program Comprehension. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, (389-392). 28 - 29 May 2018. doi:10.1145/3196321.3196368

  • Garae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. In: Proceedings of 2018 Cyber Forensic & Security International Conference (2018 CFSIC). 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, (165-177). 21-23 August 2018.

  • Will, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. In: 2017 IEEE Trustcom/BigDataSE/ICESS. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, (1024-1031). 1-4 August 2017. doi:10.1109/trustcom/bigdatase/icess.2017.347

  • Shute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. In: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, (1131-1138). 1 - 4 August 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.363

  • Will, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. In: 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, (23-32). 11-12 April 2017. doi:10.1109/ICCCRI.2017.12

  • Will, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, (449-455). 1-4 August 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.270

  • Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. In: Guojun Wang, Mohammed Atiquzzaman, Zheng Yan and Kim-Kwang Raymond Choo, Security, privacy, and anonymity in computation, communication, and Storage - SpaCCS 2017 International Workshops, proceedings. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, (180-193). 12-15 December 2017. doi:10.1007/978-3-319-72395-2_18

  • Ko, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. In: 3rd INTERPOL Digital Security Research Seminar: INTERPOL Global Complex for Innovation, Proceedings. 3rd INTERPOL Digital Security Research Seminar, Singapore, (64-72). 12-13 September 2017.

  • Garae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. In: 2017 IEEE Trustcom/BigDataSE/ICESS. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, (1123-1130). 1 -4 August 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.362

  • Will, Mark A. and Ko, Ryan K. L. (2016). Computing mod with a variable lookup table. In: Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss and Jose M. Alcaraz Calero, Security in Computing and Communications. 4th International Symposium on Security in Computing and Communications (SSCC), Jaipur, India, (3-17). 21-24 September 2016. doi:10.1007/978-981-10-2738-3_1

  • Chaisiri, Sivadon and Ko, Ryan K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. In: 2016 IEEE Trustcom/bigdatase/ispa. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (535-543). 23-26 August 2016. doi:10.1109/TrustCom.2016.0107

  • Ko, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. In: 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, (). 23-26 August 2016. doi:10.1109/trustcom.2016.0015

  • Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. In: 2016 IEEE Trustcom/BigDataSE/ISPA. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (900-908). 23-26 August 2016. doi:10.1109/TrustCom.2016.153

  • Stricot-Tarboton, Shaun, Chaisiri, Sivadon and Ko, Ryan K. L. (2016). Taxonomy of Man-in-the-Middle attacks on HTTPS. In: 2016 IEEE Trustcom/bigdatase/ispa. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (527-534). 23-26 August 2016. doi:10.1109/TrustCom.2016.105

  • Scoon, Craig and Ko, Ryan K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. In: 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (1998-2005). 23-26 August 2016. doi:10.1109/TrustCom/2016.303

  • Garae, Jeffery, Ko, Ryan K. L. and Chaisiri, Sivadon (2016). UVisP: user-centric visualization of data provenance with Gestalt principles. In: 2016 IEEE Trustcom/bigdatase/ispa. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, (1923-1930). 23-26 August 2016. doi:10.1109/TrustCom.2016.292

  • Delamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. In: 2015 IEEE Trustcom/bigdatase/ispa, Vol 1. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, (1129-1135). 20-22 August 2015. doi:10.1109/Trustcom.2015.493

  • Chaisiri, Sivadon, Ko, Ryan K. L. and Niyato, Dusit (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. In: Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, (426-433). 20-22 August 2015. doi:10.1109/Trustcom.2015.403

  • Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2015). Bin encoding: a user-centric secure full-text searching scheme for the cloud. In: Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, (563-570). 20-22 August 2015. doi:10.1109/Trustcom.2015.420

  • Li, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. In: 2015 IEEE Trustcom/BigDataSE/ISPA. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, (742-749). 20-22 August 2015. doi:10.1109/Trustcom.2015.442

  • Wu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. ITA 2015 Symposium, Liverpool, United Kingdom, (). 26-28 October 2015. doi:10.1109/cit/iucc/dasc/picom.2015.389

  • Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Message from the symposium chairs: TSCloud 2014. In: Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, (xxvi-xxvi). 24-26 September 2014. doi:10.1109/TrustCom.2014.147

  • Ko, Ryan and Choo, Kim-Kwang Raymond (2015). Message from the workshop chairs of IEEE TSCloud 2015. In: Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Symposium on Trust and Security in Cloud Computing (TrustCloud), Helsinki, Finland, (). 20 - 22 August 2015. doi:10.1109/Trustcom.2015.337

  • Ko, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. In: Wang, G., Zomaya, A., Perez, G. M. and Li, K., Algorithms and Architectures for Parallel Processing, Ica3Pp 2015. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, (57-70). 18-20 November 2015. doi:10.1007/978-3-319-27161-3_6

  • Will, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. In: 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI). International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, (173-184). 26-27 October 2015. doi:10.1109/ICCCRI.2015.30

  • Taha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. In: Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, (646-653). 20-22 August 2015. doi:10.1109/Trustcom.2015.430

  • Dong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. In: ICA3PP 2015 Workshop, Zhangjiajie, China, (). 18-20 November 2015.

  • Ko, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. In: Kesselman, C, 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, (531-537). 27 June-2 July 2014. doi:10.1109/CLOUD.2014.77

  • Ko, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. In: 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, (1033-1039). 15-18 December 2014. doi:10.1109/CloudCom.2014.23

  • Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. In: James Joshi, Elisa Bertino, Bhavani Thuraisingham and Ling Liu, 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, (62-67). 13-15 August 2014.

  • Akram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. In: 2014 IEEE 13th International Conference On Trust, Security and Privacy in Computing and Communications (Trustcom). 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, (884-892). 24-26 September 2014. doi:10.1109/TrustCom.2014.116

  • Akram, Raja Naeem and Ko, Ryan K. L. (2014). End-to-end secure and privacy preserving mobile chat application. In: David Naccache and Damien Sauveron, Proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things. International Workshop on Information Security Theory and Practice, Heraklion, Greece, (124-139). 2 July 2014. doi:10.1007/978-3-662-43826-8_9

  • Delamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. In: 2014 Ieee 13Th International Conference On Trust, Security and Privacy in Computing and Communications (Trustcom). 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, (983-988). 24-26 September 2014. doi:10.1109/TrustCom.2014.130

  • Tan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. In: Carl Kesselman, Peter Chen and Hemant Jain, 3rd IEEE International Congress on Big Data, Anchorage, AK USA, (422-429). 27 June-2 July 2014. doi:10.1109/BigData.Congress.2014.68

  • Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Preface. In: Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu, Recent Trends in Computer Networks and Distributed Systems Security. Second International Conference, SNDS 2014, Trivandrum, India, (). 13-14 March 2014. doi:10.1007/978-3-642-54525-2

  • Ko, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In: C. Kesselman, 2014 IEEE 7th International Conference on Cloud Computing. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, (881-889). 27 June - 2 July 2014. doi:10.1109/CLOUD.2014.121

  • Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. In: SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, (). 13-14 March 2014. doi:10.1007/978-3-642-54525-2

  • Akram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, (831-839). 24-26 September 2014. doi:10.1109/TrustCom.2014.110

  • Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. In: Kesselman, C., 2014 IEEE 7Th International Conference On Cloud Computing (Cloud). 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, (972-974). 27 June - 2 July 2014. doi:10.1109/CLOUD.2014.147

  • Suen, Chun Hui, Ko, Ryan K. L., Tan, Yu Shyang, Jagadpramana, Peter and Lee, Bu Sung (2013). S2Logger: end-to-end data tracking mechanism for cloud data provenance. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, (594-602). 16-18 July 2013. doi:10.1109/TrustCom.2013.73

  • Tan, Yu Shyang, Ko, Ryan K. L. and Holmes, Geoff (2013). Security and data accountability in distributed systems: a provenance survey. In: 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Zhangjiajie, China, (1571-1578). 13-15 November 2013. doi:10.1109/HPCC.and.EUC.2013.221

  • Ko, Ryan , Martucci, Leonardo and Kirchberg, Markus (2013). TSCloud 2013: Message from the Chairs. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, (). 16-18 July 2013. doi:10.1109/trustcom.2013.266

  • Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan (2012). Automating compliance for cloud computing services. In: Frank Leymann, 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, (631-637). 18 - 21 April 2012.

  • Kirchberg, Markus, Leonardi, Erwin, Tan, Yu Shyang, Link, Sebastian, Ko, Ryan K. L. and Lee, Bu Sung (2012). Formal concept discovery in semantic web data. In: Formal Concept Analysis - 10th International Conference, ICFCA 2012, Proceedings. 10th International Conference on Formal Concept Analysis, ICFCA 2012, Leuven, Belgium, (164-179). 7- 10 May 2012. doi:10.1007/978-3-642-29892-9_18

  • Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: rule-based data provenance tracing algorithms. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, (1429-1437). 25 - 27 June 2012. doi:10.1109/TrustCom.2012.175

  • Ko, Ryan K. L. and Kirchberg, Markus (2012). Message from TSCloud Symposium Chairs. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, (). 25-27 June 2012. doi:10.1109/trustcom.2012.12

  • Ko, Ryan K. L., Kirchberg, Markus, Lee, Bu Sung and Chew, Elroy (2012). Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations. In: 2012 IEEE 19th International Conference on Web Services. 2012 IEEE 19th International Conference on Web Services, Honolulu, HI United States, (654-656). 24-29 June 2012. doi:10.1109/icws.2012.107

  • Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. In: Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, (137-144). 25-27 June 2012. doi:10.1109/TrustCom.2012.282

  • Ko, Ryan K. L., Jagadpramana, Peter and Lee, Bu Sung (2011). Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. In: Wang, G., Tate, S. R., Chen, J. J. and Sakurai, K., 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, (765-771). 16-18 November 2011. doi:10.1109/TrustCom.2011.100

  • Kirchberg, Markus, Ko, Ryan K.L. and Lee, Bu Sung (2011). From linked data to relevant data - time is the essence. In: 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011). 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, (). 28 March 2011.

  • Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2011). From system-centric to data-centric logging - accountability, trust & security in cloud computing. In: 2011 Defense Science Research Conference and Expo (DSR). 2011 Defense Science Research Conference and Expo (DSR), Singapore, Singapore, (). 3 - 5 August 2011. doi:10.1109/DSR.2011.6026885

  • Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K. L. and Lee, Bu Sung (2011). How to track your data: The case for cloud computing provenance. In: Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011. 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, (446-453). 29 November - December 1 2011. doi:10.1109/CloudCom.2011.66

  • Ko, Ryan K. L., Lee, Bu Sung and Pearson, Siani (2011). Towards achieving accountability, auditability and trust in cloud computing. In: Advances in Computing and Communications - First International Conference, ACC 2011, Proceedings. 1st International Conference on Advances in Computing and Communications, ACC 2011, Kochi, India, (432-444). 22-24 July 2011. doi:10.1007/978-3-642-22726-4_45

  • Ko, Ryan K. L., Jagadpramana, Peter, Mowbray, Miranda, Pearson, Siani, Kirchberg, Markus, Liang, Qianhui and Lee, Bu Sung (2011). TrustCloud: A framework for accountability and trust in cloud computing. In: Proceedings - 2011 IEEE World Congress on Services, SERVICES 2011. 2011 IEEE World Congress on Services, Washington, DC United States, (584-588). 4-9 July 2011. doi:10.1109/SERVICES.2011.91

  • Ko, Ryan K.L., Lee, Stephen S. G., Lee, E. W. and Jusuf, Andre (2009). Dynamic collaborative business process formulation via ontologised hierarchical task network (HTN) planning. In: 2009 IEEE International Conference on Web Services. 2009 IEEE International Conference on Web Services, Los Angeles, CA USA, (959-967). 6-10 July 2009. doi:10.1109/icws.2009.77

  • Le, Duy Ngan, Nguyen, Ngoc Son, Mous, Karel, Ko, Ryan Kok Leong and Goh, Angela Eck Soong (2009). Generating request web services from annotated BPEL. In: 2009 IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future, RIVF 2009. 2009 IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future, RIVF 2009, Da Nang, Vietnam, (). 13-17 July 2009. doi:10.1109/RIVF.2009.5174641

  • Ko, Ryan K. L., Jusuf, Andre and Lee, S. G. (2009). Genesis Dynamic Collaborative Business Process Formulation Based on Business Goals and Criteria. In: 2009 Congress on Services - I. 2009 Congress on Services, Los Angeles, CA United States, (). 6-10 July 2009. doi:10.1109/services-i.2009.108

  • Mous, K., Ko, K. L., Lee, S. G., Tan, P. S. and Lee, E. W. (2007). High-level business processes for agile B2B collaboration. In: Srichand Hinduja and Kuang-Chao Fan, Proceedings of the 35th International MATADOR 2007 Conference. 35th International MATADOR Conference, Taipei, Taiwan , (169-172). July 2007.

Other Outputs