2016 Conference Publication Privacy preserving computation by fragmenting individual bits and distributing gatesWill, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.153 |
2016 Conference Publication Message from the TSCloud 2016 Symposium ChairsKo, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 August 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2016.0015 |
2015 Conference Publication A Global, Empirical Analysis of the Shellshock Vulnerability in Web ApplicationsDelamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, 20-22 August 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/Trustcom.2015.493 |
2015 Conference Publication Welcome message from the ICA3PP 2015 workshop chairsDong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. ICA3PP 2015 Workshop, Zhangjiajie, China, 18-20 November 2015. Heidelberg, Germany: Springer. |
2015 Conference Publication A joint optimization approach to security-as-a-service allocation and cyber insurance managementChaisiri, Sivadon, Ko, Ryan K. L. and Niyato, Dusit (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.403 |
2015 Conference Publication Message from the ITA 2015 Symposium ChairsWu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. ITA 2015 Symposium, Liverpool, United Kingdom, 26-28 October 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit/iucc/dasc/picom.2015.389 |
2015 Conference Publication Message from the workshop chairs of IEEE TSCloud 2015Ko, Ryan and Choo, Kim-Kwang Raymond (2015). Message from the workshop chairs of IEEE TSCloud 2015. Symposium on Trust and Security in Cloud Computing (TrustCloud), Helsinki, Finland, 20 - 22 August 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom.2015.337 |
2015 Conference Publication Secure Voting in the Cloud using Homomorphic Encryption and Mobile AgentsWill, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, 26-27 October 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICCCRI.2015.30 |
2015 Conference Publication Inferring user actions from provenance logsLi, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442 |
2015 Conference Publication STRATUS: Towards Returning Data Control to Cloud UsersKo, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_6 |
2015 Conference Publication Trusted tamper-evident data provenanceTaha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.430 |
2015 Conference Publication Bin encoding: a user-centric secure full-text searching scheme for the cloudWill, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2015). Bin encoding: a user-centric secure full-text searching scheme for the cloud. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/Trustcom.2015.420 |
2015 Conference Publication Message from the symposium chairs: TSCloud 2014Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Message from the symposium chairs: TSCloud 2014. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2014.147 |
2014 Conference Publication End-to-end secure and privacy preserving mobile chat applicationAkram, Raja Naeem and Ko, Ryan K. L. (2014). End-to-end secure and privacy preserving mobile chat application. International Workshop on Information Security Theory and Practice, Heraklion, Greece, 2 July 2014. New York, NY, United States: Springer . doi: 10.1007/978-3-662-43826-8_9 |
2014 Conference Publication Consumer-centric protection for online social networksAkram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872 |
2014 Conference Publication A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) ApproachKo, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23 |
2014 Conference Publication Virtual Numbers for Virtual Machines?Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147 |
2014 Conference Publication 'Time' for cloud? Design and implementation of a time-based cloud resource management systemKo, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77 |
2014 Conference Publication Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance trackingKo, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121 |
2014 Conference Publication Recent Trends in Computer Networks and Distributed Systems Security - PrefacePérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag. |