|
2015 Conference Publication Inferring user actions from provenance logsLi, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442 |
|
2015 Book Chapter Cloud security ecosystemKo, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X |
|
2015 Book The cloud security ecosystem: technical, legal, business and management issuesRyan K. L. Ko and Kim-Kwang Raymond Choo eds. (2015). The cloud security ecosystem: technical, legal, business and management issues. Waltham, MA USA: Elsevier. doi: 10.1016/C2014-0-00456-X |
|
2015 Conference Publication Trusted tamper-evident data provenanceTaha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.430 |
|
2015 Conference Publication STRATUS: Towards Returning Data Control to Cloud UsersKo, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_6 |
|
2015 Book Chapter Provenance for cloud data accountabilityTan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. (pp. 171-185) Waltham, MA United States: Elsevier. doi: 10.1016/B978-0-12-801595-7.00008-2 |
|
2015 Conference Publication Welcome message from the ICA3PP 2015 workshop chairsDong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. ICA3PP 2015 Workshop, Zhangjiajie, China, 18-20 November 2015. Heidelberg, Germany: Springer. |
|
2015 Conference Publication Secure Voting in the Cloud using Homomorphic Encryption and Mobile AgentsWill, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, 26-27 October 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICCCRI.2015.30 |
|
2015 Conference Publication Message from the ITA 2015 Symposium ChairsWu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. ITA 2015 Symposium, Liverpool, United Kingdom, 26-28 October 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit/iucc/dasc/picom.2015.389 |
|
2015 Book Chapter A guide to homomorphic encryptionWill, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. The cloud security ecosystem: technical, legal, business and management issues. (pp. 101-127) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00005-7 |
|
2014 Journal Article Special issue on trust and security in cloud computingKo, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154 |
|
2014 Other Outputs Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.Benzie, Julie, McCarter, Dale and Ko, Ryan (2014). Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.. New Zealand: Vodafone NZ. |
|
2014 Journal Article Special issue on advances in trust, security and privacy for wireless and mobile networksWu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7 |
|
2014 Journal Article A toolkit for automating compliance in cloud computing servicesPapanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830 |
|
2014 Conference Publication Escrow: A Large-Scale Web Vulnerability Assessment ToolDelamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130 |
|
2014 Conference Publication Digital Trust - Trusted Computing and Beyond A Position PaperAkram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116 |
|
2014 Conference Publication Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance trackingKo, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121 |
|
2014 Conference Publication OpenStack Cafe: a novel time-based user-centric resource management framework in the cloudTan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68 |
|
2014 Journal Article TSP 2013: message from workshop chairsMin, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350 |
|
2014 Conference Publication Recent Trends in Computer Networks and Distributed Systems Security - PrefacePérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag. |