2014 Book Trends and Applications of Serious Gaming and Social MediaYoungkyun Baek , Ryan Ko and Tim Marsh eds. (2014). Trends and Applications of Serious Gaming and Social Media. Gaming Media and Social Effects, Singapore: Springer. doi: 10.1007/978-981-4560-26-9 |
2014 Conference Publication Unified Model for Data Security - A Position PaperAkram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.110 |
2014 Conference Publication Virtual Numbers for Virtual Machines?Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147 |
2014 Journal Article A toolkit for automating compliance in cloud computing servicesPapanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830 |
2014 Conference Publication Escrow: A Large-Scale Web Vulnerability Assessment ToolDelamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130 |
2014 Conference Publication Digital Trust - Trusted Computing and Beyond A Position PaperAkram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116 |
2014 Conference Publication Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance trackingKo, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121 |
2014 Conference Publication OpenStack Cafe: a novel time-based user-centric resource management framework in the cloudTan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68 |
2014 Journal Article TSP 2013: message from workshop chairsMin, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350 |
2014 Conference Publication Recent Trends in Computer Networks and Distributed Systems Security - PrefacePérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag. |
2014 Book Chapter Data accountability in cloud systemsKo, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7 |
2014 Conference Publication Consumer-centric protection for online social networksAkram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872 |
2014 Book Recent trends in computer networks and distributed systems securityGregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu eds. (2014). Recent trends in computer networks and distributed systems security. Communications in Computer and Information Science, Berlin, Heidelberg: Springer, Berlin, Heidelberg. doi: 10.1007/978-3-642-54525-2 |
2014 Conference Publication 'Time' for cloud? Design and implementation of a time-based cloud resource management systemKo, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77 |
2014 Conference Publication A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) ApproachKo, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23 |
2014 Journal Article Computing Mod Without ModWill, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod. |
2013 Other Outputs Determining file allocation based on file operationsTan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2. |
2013 Other Outputs Cloud computing vulnerability incidents: a statistical overviewKo, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance. |
2013 Other Outputs Tracing data block operationsSuen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1. |
2013 Other Outputs Tracing operations in a cloud systemKo, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1. |