Current
Staff
>
Assoc Prof. Ryan Ko
Involved Projects
Publications
(2017) Returning Control of Data to Users with a Personal Information Crunch - …
/sites/default/files/2017-04/ICCCRI_2017_paper_05-ReturningControlofDatatoUsers…
(2016) The Data Privacy Matrix: Towards a Global Alignment of Data Privacy Laws
/publications/articles/TheDataPrivacyMatrixTowardsaGlobalAlignmentofDataPrivacy…
(2016) Taxonomy of Man-in-the-Middle Attacks on HTTPS
/publications/articles/TaxonomyofManintheMiddleAttacksonHTTPS
(2016) UVisP: User-centric Visualization of Data Provenance with Gestalt Princi…
/publications/articles/UVisPUsercentricVisualizationofDataProvenancewithGestalt…
(2016) From Reactionary to Proactive Security: Context-Aware Security Policy Ma…
/publications/articles/FromReactionarytoProactiveSecurityContextAwareSecurityPo…
(2016) Privacy Preserving Computation by Fragmenting Individual Bits and Distri…
/publications/articles/PrivacyPreservingComputationbyFragmentingIndividualBitsa…
(2015) Inferring User Actions from Provenance Logs
/publications/articles/InferringUserActionsfromProvenanceLogs
(2015) A Global, Empirical Analysis of the Shellshock Vulnerability in Web Appl…
/publications/articles/AGlobalEmpiricalAnalysisoftheShellshockVulnerabilityinWe…
(2015) A Guide to Homomorphic Encryption
/publications/articles/AGuidetoHomomorphicEncryption
(2015) The Cloud Security Ecosystem
/publications/articles/TheCloudSecurityEcosystem
(2015) Trusted Tamper-Evident Data Provenance
/publications/articles/TrustedTamperEvidentDataProvenance
(2015) A Joint Optimization Approach to Security-as-a-Service Allocation and Cy…
/publications/articles/AJointOptimizationApproachtoSecurityasaServiceAllocation…
(2015) Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the C…
/publications/articles/BinEncodingAUserCentricSecureFullTextSearchingSchemefort…
(2015) Security as a Service (SaaS) -- An Overview
/publications/articles/SecurityasaServiceSaaSAnOverview
(2015) Provenance for Cloud Data Accountability
/publications/articles/ProvenanceforCloudDataAccountability
(2015) The Cloud Security Ecosystem: Technical, Legal, Business and Management …
/publications/articles/TheCloudSecurityEcosystemTechnicalLegalBusinessandManage…
(2015) STRATUS: Towards Returning Data Control to Cloud Users
/publications/articles/STRATUSTowardsReturningDataControltoCloudUsers
(2014) End-to-End Secure and Privacy Preserving Mobile Chat Application
/publications/articles/EndtoEndSecureandPrivacyPreservingMobileChatApplication
(2014) Virtual Numbers for Virtual Machines?
/publications/articles/VirtualNumbersforVirtualMachines
(2014) OpenStack Café: A Novel Time-Based User-Centric Resource Management Fram…
/publications/articles/OpenStackCafeANovelTimeBasedUserCentricResourceManagemen…
(2014) 'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resour…
/publications/articles/TimeforCloudDesignandImplementationofaTimeBasedCloudReso…
(2014) Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data…
/publications/articles/ProggerAnEfficientTamperEvidentKernelSpaceLoggerforCloud…
(2014) Unified Model for Data Security - A Position Paper
/publications/articles/UnifiedModelforDataSecurityAPositionPaper
(2014) Digital Trust - Trusted Computing and Beyond A Position Paper
/publications/articles/DigitalTrustTrustedComputingandBeyondAPositionPaper
(2014) Escrow: A Large-Scale Web Vulnerability Assessment Tool
/publications/articles/EscrowALargeScaleWebVulnerabilityAssessmentTool
(2014) A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach
/publications/articles/AMantrapInspiredUserCentricDataLeakagePreventionDLPAppro…
(2013) S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
/publications/articles/S2LoggerEndtoEndDataTrackingMechanismforCloudDataProvena…
(2013) Security and Data Accountability in Distributed Systems: A Provenance Su…
/publications/articles/SecurityandDataAccountabilityinDistributedSystemsAProven…
(2013) Data Accountability in Cloud Systems
/publications/articles/DataAccountabilityinCloudSystems
(2013) Cloud Computing Vulnerability Incidents: A Statistical Overview
/publications/articles/CloudComputingVulnerabilityIncidentsAStatisticalOverview
(2012) Understanding Cloud Failures
/publications/articles/UnderstandingCloudFailures