Ryan Kok Leong Ko

According to our database1, Ryan Kok Leong Ko authored at least 58 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps.
Proceedings of the 26th Conference on Program Comprehension, 2018

2017
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks.
Security and Communication Networks, 2017

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Taxonomy of Man-in-the-Middle Attacks on HTTPS.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

UVisP: User-centric Visualization of Data Provenance with Gestalt Principles.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Computing Mod with a Variable Lookup Table.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2015
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Trusted Tamper-Evident Data Provenance.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Inferring User Actions from Provenance Logs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

STRATUS: Towards Returning Data Control to Cloud Users.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A guide to homomorphic encryption.
Proceedings of the Cloud Security Ecosystem, 2015

Provenance for cloud data accountability.
Proceedings of the Cloud Security Ecosystem, 2015

Cloud security ecosystem.
Proceedings of the Cloud Security Ecosystem, 2015

Security as a service (SecaaS) - An overview.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks.
Wireless Personal Communications, 2014

Special issue on trust and security in cloud computing.
Security and Communication Networks, 2014

A toolkit for automating compliance in cloud computing services.
IJCC, 2014

Computing Mod Without Mod.
IACR Cryptology ePrint Archive, 2014

End-to-End Secure and Privacy Preserving Mobile Chat Application.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Escrow: A Large-Scale Web Vulnerability Assessment Tool.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Digital Trust - Trusted Computing and Beyond: A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Unified Model for Data Security - A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Consumer-centric protection for online social networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

OpenStack Café: A Novel Time-Based User-centric Resource Management Framework in the Cloud.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Virtual Numbers for Virtual Machines?
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Security and Data Accountability in Distributed Systems: A Provenance Survey.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Business-OWL (BOWL) - A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation.
IEEE Trans. Services Computing, 2012

How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Tracking of Data Leaving the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Formal Concept Discovery in Semantic Web Data.
Proceedings of the Formal Concept Analysis - 10th International Conference, 2012

Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
From Linked Data to Relevant Data -- Time is the Essence
CoRR, 2011

Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

TrustCloud: A Framework for Accountability and Trust in Cloud Computing.
Proceedings of the World Congress on Services, 2011

How to Track Your Data: The Case for Cloud Computing Provenance.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Towards Achieving Accountability, Auditability and Trust in Cloud Computing.
Proceedings of the Advances in Computing and Communications, 2011

2010
Cloud computing in plain English.
ACM Crossroads, 2010

2009
A computer scientist's introductory guide to business process management (BPM).
ACM Crossroads, 2009

Business process management (BPM) standards: a survey.
Business Proc. Manag. Journal, 2009

Genesis.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Generating Request Web Services from Annotated BPEL.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning.
Proceedings of the IEEE International Conference on Web Services, 2009


  Loading...