Skip to menu Skip to content Skip to footer

2014

Conference Publication

Recent Trends in Computer Networks and Distributed Systems Security - Preface

Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag.

Recent Trends in Computer Networks and Distributed Systems Security - Preface

2014

Book Chapter

Data accountability in cloud systems

Ko, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7

Data accountability in cloud systems

2014

Conference Publication

Consumer-centric protection for online social networks

Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872

Consumer-centric protection for online social networks

2014

Book

Recent trends in computer networks and distributed systems security

Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu eds. (2014). Recent trends in computer networks and distributed systems security. Communications in Computer and Information Science, Berlin, Heidelberg: Springer, Berlin, Heidelberg. doi: 10.1007/978-3-642-54525-2

Recent trends in computer networks and distributed systems security

2013

Other Outputs

Determining file allocation based on file operations

Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.

Determining file allocation based on file operations

2013

Other Outputs

Cloud computing vulnerability incidents: a statistical overview

Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.

Cloud computing vulnerability incidents: a statistical overview

2013

Other Outputs

Tracing data block operations

Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.

Tracing data block operations

2013

Other Outputs

Tracing operations in a cloud system

Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.

Tracing operations in a cloud system

2013

Other Outputs

Tracing operations in a cloud system

Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.

Tracing operations in a cloud system

2013

Conference Publication

Security and data accountability in distributed systems: a provenance survey

Tan, Yu Shyang, Ko, Ryan K. L. and Holmes, Geoff (2013). Security and data accountability in distributed systems: a provenance survey. 15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Zhangjiajie, China, 13-15 November 2013. New York, NY, United States: IEEE. doi: 10.1109/HPCC.and.EUC.2013.221

Security and data accountability in distributed systems: a provenance survey

2013

Conference Publication

TSCloud 2013: Message from the Chairs

Ko, Ryan , Martucci, Leonardo and Kirchberg, Markus (2013). TSCloud 2013: Message from the Chairs. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2013.266

TSCloud 2013: Message from the Chairs

2013

Conference Publication

S2Logger: end-to-end data tracking mechanism for cloud data provenance

Suen, Chun Hui, Ko, Ryan K. L., Tan, Yu Shyang, Jagadpramana, Peter and Lee, Bu Sung (2013). S2Logger: end-to-end data tracking mechanism for cloud data provenance. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/TrustCom.2013.73

S2Logger: end-to-end data tracking mechanism for cloud data provenance

2012

Journal Article

Understanding cloud failures

Ko, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788

Understanding cloud failures

2012

Journal Article

Message from UbiSafe-2012 symposium chairs

Vasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305

Message from UbiSafe-2012 symposium chairs

2012

Journal Article

How to track your data: Rule-based data provenance tracing algorithms

Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109)

How to track your data: Rule-based data provenance tracing algorithms

2012

Journal Article

Tracking of data leaving the cloud

Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108)

Tracking of data leaving the cloud

2012

Journal Article

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

Ko, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

2012

Journal Article

How to track your data: The case for cloud computing provenance

Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11).

How to track your data: The case for cloud computing provenance

2012

Conference Publication

Automating compliance for cloud computing services

Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan (2012). Automating compliance for cloud computing services. 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April 2012. Setúbal, Portugal: SciTe Press.

Automating compliance for cloud computing services

2012

Conference Publication

How to track your data: rule-based data provenance tracing algorithms

Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: rule-based data provenance tracing algorithms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25 - 27 June 2012. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2012.175

How to track your data: rule-based data provenance tracing algorithms