Skip to menu Skip to content Skip to footer

2014

Book

Trends and Applications of Serious Gaming and Social Media

Youngkyun Baek , Ryan Ko and Tim Marsh eds. (2014). Trends and Applications of Serious Gaming and Social Media. Gaming Media and Social Effects, Singapore: Springer. doi: 10.1007/978-981-4560-26-9

Trends and Applications of Serious Gaming and Social Media

2014

Conference Publication

Unified Model for Data Security - A Position Paper

Akram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.110

Unified Model for Data Security - A Position Paper

2014

Conference Publication

Virtual Numbers for Virtual Machines?

Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147

Virtual Numbers for Virtual Machines?

2014

Journal Article

A toolkit for automating compliance in cloud computing services

Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830

A toolkit for automating compliance in cloud computing services

2014

Conference Publication

Escrow: A Large-Scale Web Vulnerability Assessment Tool

Delamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130

Escrow: A Large-Scale Web Vulnerability Assessment Tool

2014

Conference Publication

Digital Trust - Trusted Computing and Beyond A Position Paper

Akram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116

Digital Trust - Trusted Computing and Beyond A Position Paper

2014

Conference Publication

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking

Ko, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking

2014

Conference Publication

OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud

Tan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68

OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud

2014

Journal Article

TSP 2013: message from workshop chairs

Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350

TSP 2013: message from workshop chairs

2014

Conference Publication

Recent Trends in Computer Networks and Distributed Systems Security - Preface

Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag.

Recent Trends in Computer Networks and Distributed Systems Security - Preface

2014

Book Chapter

Data accountability in cloud systems

Ko, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7

Data accountability in cloud systems

2014

Conference Publication

Consumer-centric protection for online social networks

Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872

Consumer-centric protection for online social networks

2014

Book

Recent trends in computer networks and distributed systems security

Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu eds. (2014). Recent trends in computer networks and distributed systems security. Communications in Computer and Information Science, Berlin, Heidelberg: Springer, Berlin, Heidelberg. doi: 10.1007/978-3-642-54525-2

Recent trends in computer networks and distributed systems security

2014

Conference Publication

'Time' for cloud? Design and implementation of a time-based cloud resource management system

Ko, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77

'Time' for cloud? Design and implementation of a time-based cloud resource management system

2014

Conference Publication

A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach

Ko, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23

A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach

2014

Journal Article

Computing Mod Without Mod

Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.

Computing Mod Without Mod

2013

Other Outputs

Determining file allocation based on file operations

Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.

Determining file allocation based on file operations

2013

Other Outputs

Cloud computing vulnerability incidents: a statistical overview

Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.

Cloud computing vulnerability incidents: a statistical overview

2013

Other Outputs

Tracing data block operations

Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.

Tracing data block operations

2013

Other Outputs

Tracing operations in a cloud system

Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.

Tracing operations in a cloud system