Professor Ryan Ko
Chair and Director, CyberSecurity
School of Information Technology & Electrical Engineering
+ 61 7 336 51092
Room 459, General Purpose South Building (78)

Professor Ryan Ko is Chair and Director of UQ Cyber Security at the University of Queensland, Australia. His applied research in cyber security focuses on 'returning control of data to cloud computing users'. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing (homomorphic encryption). Both his research foci are recognised nationally and internationally, receiving conference Best Paper Awards (2011, 2015, 2017), and technology transfers locally and internationally.
Publications
Book Chapters
Yu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2019). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12
Phua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1
Garae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13
Will, Mark A. and Ko, Ryan K. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5
Scoon, Craig and Ko, Ryan K. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11
Kumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1
Garae, Jeffery and Ko, Ryan K. L. (2017). Visualization and Data Provenance Trends in Decision Support for Cybersecurity. Data Analytics and Decision Support for Cybersecurity. (pp. 243-270) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-59439-2_9
Ko, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X
Delamore, Baden and Ko, Ryan K. L. (2015). Security as a service (SecaaS)—An overview. The Cloud Security Ecosystem. (pp. 187-203) Waltham, MA United States: Elsevier. doi: 10.1016/b978-0-12-801595-7.00009-4
Tan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. (pp. 171-185) Waltham, MA United States: Elsevier. doi: 10.1016/B978-0-12-801595-7.00008-2
Will, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. The cloud security ecosystem: technical, legal, business and management issues. (pp. 101-127) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00005-7
Ko, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7
Journal Articles
O’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 1-1. doi: 10.1109/MIS.2020.3005930
Takahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9
Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626
Liu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310
Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154
Wu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7
Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532 doi: 10.1109/HPCC.and.EUC.2013.350
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830
Ko, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788
Vasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305
Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108)
Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109)
Ko, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48
Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11)
Ko, Ryan K.L., Jagadpramana, Peter and Lee, Bu Sung (2011). Flogger: A File-centric logger for monitoring file access and transfers within cloud computing environments. HP Laboratories Technical Report (119), 1-8.
Ko, Ryan K. L. (2010). Cloud computing in plain English. Crossroads, 16 (3), 5-6. doi: 10.1145/1734160.1734163
Ko, Ryan K. L. (2009). A computer scientist's introductory guide to business process management (BPM). Crossroads, 15 (4), 11-18. doi: 10.1145/1558897.1558901
Ko, Ryan K. L., Lee, Stephen S. G. and Lee, Eng Wah (2009). Business process management (BPM) standards: a survey. Business Process Management Journal, 15 (5), 744-791. doi: 10.1108/14637150910987937
Conference Papers
Fatehi, Farhad, Hassandoust, Farkhondeh, Ko, Ryan K. L. and Akhlaghpour, Saeed (2020). General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. Amsterdam, Netherlands: IOS Press. doi: 10.3233/SHTI200336
Thampi, Sabu M., Martinez Perez, Gregorio, Ko, Ryan and Rawat, Danda B. (2020). Preface. 7th International Symposium on Security in Computing and Communications, SSCC 2019, Trivandrum, India, 18 - 21 December 2019. Heidelberg, Germany: Springer.
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Ko, Ryan, Chen, Liqun and Zhu, Liming (2019). Message from IEEE TrustCom 2019 General Chairs. 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5-8 August 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/trustcom/bigdatase.2019.00005
Garae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, 21-23 August 2018. Nuku'alofa, Tonga:
Scarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, 28 - 29 May 2018. New York, NY United States: ACM. doi: 10.1145/3196321.3196368
Garae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, 31 July - 3 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/TrustCom/BigDataSE.2018.00095
Will, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, 1-4 August 2017. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom/bigdatase/icess.2017.347
Ko, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. 3rd INTERPOL Digital Security Research Seminar, Singapore, 12-13 September 2017. Singapore: INTERPOL.
Garae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 -4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.362
Will, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, 11-12 April 2017. Piscataway, NJ, United States: IEEE. doi: 10.1109/ICCCRI.2017.12
Will, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, 1-4 August 2017. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.270
Shute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.363
Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, 12-15 December 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72395-2_18
Mueller, Peter, Thampi, Sabu M., Alam Bhuiyan, Md. Zakirul, Ko, Ryan, Doss, Robin and Alcaraz Calero, Jose M. (2016). Preface. 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016. Singapore: Springer.
Ko, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 August 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2016.0015
Garae, Jeffery, Ko, Ryan K. L. and Chaisiri, Sivadon (2016). UVisP: user-centric visualization of data provenance with Gestalt principles. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.292
Scoon, Craig and Ko, Ryan K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom/2016.303
Chaisiri, Sivadon and Ko, Ryan K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.0107
Will, Mark A. and Ko, Ryan K. L. (2016). Computing mod with a variable lookup table. 4th International Symposium on Security in Computing and Communications (SSCC), Jaipur, India, 21-24 September 2016. Singapore: Springer. doi: 10.1007/978-981-10-2738-3_1
Stricot-Tarboton, Shaun, Chaisiri, Sivadon and Ko, Ryan K. L. (2016). Taxonomy of Man-in-the-Middle attacks on HTTPS. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.105
Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.153
Li, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442
Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2015). Bin encoding: a user-centric secure full-text searching scheme for the cloud. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/Trustcom.2015.420
Will, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, 26-27 October 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICCCRI.2015.30
Ko, Ryan and Choo, Kim-Kwang Raymond (2015). Message from the workshop chairs of IEEE TSCloud 2015. Symposium on Trust and Security in Cloud Computing (TrustCloud), Helsinki, Finland, 20 - 22 August 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom.2015.337
Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Message from the symposium chairs: TSCloud 2014. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2014.147
Dong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. ICA3PP 2015 Workshop, Zhangjiajie, China, 18-20 November 2015. Heidelberg, Germany: Springer.
Ko, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_6
Delamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, 20-22 August 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/Trustcom.2015.493
Taha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.430
Wu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. ITA 2015 Symposium, Liverpool, United Kingdom, 26-28 October 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit/iucc/dasc/picom.2015.389
Chaisiri, Sivadon, Ko, Ryan K. L. and Niyato, Dusit (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.403
Ko, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77
Ko, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23
Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag. doi: 10.1007/978-3-642-54525-2
Tan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68
Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147
Akram, Raja Naeem and Ko, Ryan K. L. (2014). End-to-end secure and privacy preserving mobile chat application. International Workshop on Information Security Theory and Practice, Heraklion, Greece, 2 July 2014. New York, NY, United States: Springer . doi: 10.1007/978-3-662-43826-8_9
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.110
Delamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130
Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116
Ko, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121
Ko, Ryan , Martucci, Leonardo and Kirchberg, Markus (2013). TSCloud 2013: Message from the Chairs. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2013.266
Tan, Yu Shyang, Ko, Ryan K. L. and Holmes, Geoff (2013). Security and data accountability in distributed systems: a provenance survey. 15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Zhangjiajie, China, 13-15 November 2013. New York, NY, United States: IEEE. doi: 10.1109/HPCC.and.EUC.2013.221
Suen, Chun Hui, Ko, Ryan K. L., Tan, Yu Shyang, Jagadpramana, Peter and Lee, Bu Sung (2013). S2Logger: end-to-end data tracking mechanism for cloud data provenance. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/TrustCom.2013.73
Ko, Ryan K. L., Kirchberg, Markus, Lee, Bu Sung and Chew, Elroy (2012). Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations. 2012 IEEE 19th International Conference on Web Services, Honolulu, HI United States, 24-29 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/icws.2012.107
Kirchberg, Markus, Leonardi, Erwin, Tan, Yu Shyang, Link, Sebastian, Ko, Ryan K. L. and Lee, Bu Sung (2012). Formal concept discovery in semantic web data. 10th International Conference on Formal Concept Analysis, ICFCA 2012, Leuven, Belgium, 7- 10 May 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-29892-9_18
Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25-27 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2012.282
Ko, Ryan K. L. and Kirchberg, Markus (2012). Message from TSCloud Symposium Chairs. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25-27 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom.2012.12
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan (2012). Automating compliance for cloud computing services. 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April 2012. Setúbal, Portugal: SciTe Press.
Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: rule-based data provenance tracing algorithms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25 - 27 June 2012. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2012.175
Kirchberg, Markus, Ko, Ryan K.L. and Lee, Bu Sung (2011). From linked data to relevant data - time is the essence. 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, 28 March 2011.
Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2011). From system-centric to data-centric logging - accountability, trust & security in cloud computing. 2011 Defense Science Research Conference and Expo (DSR), Singapore, Singapore, 3 - 5 August 2011. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSR.2011.6026885
Ko, Ryan K. L., Lee, Bu Sung and Pearson, Siani (2011). Towards achieving accountability, auditability and trust in cloud computing. 1st International Conference on Advances in Computing and Communications, ACC 2011, Kochi, India, 22-24 July 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-22726-4_45
Ko, Ryan K. L., Jagadpramana, Peter and Lee, Bu Sung (2011). Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16-18 November 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2011.100
Ko, Ryan K. L., Jagadpramana, Peter, Mowbray, Miranda, Pearson, Siani, Kirchberg, Markus, Liang, Qianhui and Lee, Bu Sung (2011). TrustCloud: A framework for accountability and trust in cloud computing. 2011 IEEE World Congress on Services, Washington, DC United States, 4-9 July 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/SERVICES.2011.91
Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K. L. and Lee, Bu Sung (2011). How to track your data: The case for cloud computing provenance. 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, 29 November - December 1 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2011.66
Ko, Ryan K. L., Jusuf, Andre and Lee, S. G. (2009). Genesis Dynamic Collaborative Business Process Formulation Based on Business Goals and Criteria. 2009 Congress on Services, Los Angeles, CA United States, 6-10 July 2009. Piscataway, NJ United States: IEEE. doi: 10.1109/services-i.2009.108
Ko, Ryan K.L., Lee, Stephen S. G., Lee, E. W. and Jusuf, Andre (2009). Dynamic collaborative business process formulation via ontologised hierarchical task network (HTN) planning. 2009 IEEE International Conference on Web Services, Los Angeles, CA USA, 6-10 July 2009. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icws.2009.77
Le, Duy Ngan, Nguyen, Ngoc Son, Mous, Karel, Ko, Ryan Kok Leong and Goh, Angela Eck Soong (2009). Generating request web services from annotated BPEL. 2009 IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future, RIVF 2009, Da Nang, Vietnam, 13-17 July 2009. Piscataway, NJ United States: IEEE. doi: 10.1109/RIVF.2009.5174641
Mous, K., Ko, K. L., Lee, S. G., Tan, P. S. and Lee, E. W. (2007). High-level business processes for agile B2B collaboration. 35th International MATADOR Conference, Taipei, Taiwan , July 2007. London, United Kingdom: Springer.
Data Collection
Ko, Ryan, Tsen, Elinor and Slapnicar, Sergeja (2020). Dataset of data breaches and ransomware attacks over 15 years from 2004. The University of Queensland. (Dataset) doi: 10.14264/dfe5027
Department Technical Report
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2011). Towards greater accountability in cloud computing through natural-language analysis and automated policy enforcement. HPL-2011-118. HP Laboratories.
Thesis
Ko, Ryan Kok Leong (2011). A hybrid hierarchical task network planning and ontological approach for dynamic cross-enterprise business process formulation. PhD Thesis, College of Engineering, Nanyang Technological University Singapore.
Preprints
Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.
Research Reports
Dizon, Michael, Ko, Ryan, Rumbles, Wayne, Gonzalez, Patricia, McHugh, Philip and Meehan, Anthony (2019). A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand. NZ Law Foundation: NZ Law Foundation.
Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.
Benzie, Julie, McCarter, Dale and Ko, Ryan (2014). Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.. New Zealand: Vodafone NZ.
Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.
Ko, Ryan K. L., Goh, George, Jaini, Srinivas and Mather, Tim (2011). Cloud Consumer Advocacy questionnaire and information survey. Seattle, USA: Cloud Security Alliance.
Patents
Ko, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876.
Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.
Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.
Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.
Newspaper Articles
Ryan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online
Ko, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127.
Burton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1.
Ko, Ryan (2016, 11 27). Why we need a remote kill switch for our online data Waikato Times 1-1.