Published Articles

2017

  • Liu, L., Ko, R. K. L., Ren, G., & Xu, X. (2017). Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Security and Communication Networks. vol. 2017, Article ID 2910310, 8 pages, 2017. doi:10.1155/2017/2910310 {PDF}
  • Will, M. A., Garae, J., Tan, A. Y. S., Scoon, C., & Ko, R. K. L. (2017). Returning Control of Data to Users with a Personal Information Crunch - A Position Paper. International Conference on Cloud Computing Research and Innovation. {PDF}

2016

  • Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R., & Alcaraz Calero, J. M. (2016). Preface: Proc 4th International Symposium on Security in Computing and Communications. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625. Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3
     
  • Will, M. A., & Ko, R. K. L. (2016). Computing mod with a variable lookup table. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625 (pp. 3-17). Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3_1, {PDF}
     
  • Garae, J., Ko, R. K. L., & Chaisiri, S. (2016). UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0294, {PDF}
     
  • Will, M. A., Ko, R. K. L., & Whitten, I. H. (2016). Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0154, {PDF}
     
  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016). Taxonomy of Man-in-the-Middle Attacks on HTTPS. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0106, {PDF}
     
  • Chaisiri, S., & Ko, R. K. L. (2016). From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0107, {PDF}
     
  • Scoon C., & Ko, R. K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0305, {PDF}

2015

  • Will, M. A., Nicholson, B., Tiehuis, M., & Ko, R. K. L. (2015). Secure voting in the cloud using homomorphic encryption and mobile agents. In Proc 2015 International Conference on Cloud Computing Research and Innovation (pp. 173-184). Singapore: IEEE. doi:10.1109/ICCCRI.2015.30, {PDF}
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). Cloud security ecosystem. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 1-14). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00001-X
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). The cloud security ecosystem: technical, legal, business and management issues. online: Elsevier Inc. doi:10.1016/B978-0-12-801595-7.09991-2
     
  • Will, M. A., & Ko, R. K. L. (2015). A guide to homomorphic encryption. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 101-127). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00005-7
     
  • Tan, A. Y. S., Ko, R. K. L., Holmes, G., & Rogers, B. (2015). Provenance for cloud data accountability. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 171-185). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00008-2
     
  • Delamore, B., & Ko, R. K. L. (2015). Security as a service (SaaS)—An overview. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 187-203). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00009-4
     
  • Wu, Y., Ko, R., Javadi, B., & Al-Dubai, A. (2015). Message from the ITA 2015 symposium chairs. In Proc 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing (pp. lviii). Liverpool, UK: IEEE. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.389
     
  • Ko, R. K. L., Russello, G., Nelson, R., Pang, S., Cheang, A., Dobbie, G., . . . Holmes, G. (2015). STRATUS: Towards returning data control to cloud users. In G. Wang, A. Zomaya, G. M. Perez, & K. Li (Eds.), Algorithms and Architectures for Parallel Processing: ICA3PP International Workshops and Symposiums Proceedings Vol. LNCS 9532 (pp. 57-70). Zhangjiajie, China: Springer International Publishing. doi:10.1007/978-3-319-27161-3_6, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2015). Unified model for data security - A position paper. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 831-839). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.110, {PDF}
     
  • Delamore, B., & Ko, R. K. L. (2015). Escrow: A large-scale web vulnerability assessment tool. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 983-988). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.130, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2015). Digital trust - trusted computing and beyond: A position paper. In Proceedings 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 884-892). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.116, {PDF}
     
  • Ko, R. K. L., & Delamore, B. (2015). A global, empirical analysis of the Shellshock Vulnerability in Web applications. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1129-1135). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.493
     
  • Will, M., Ko, R. K. L., & Witten, I. (2015). Bin encoding: a user-centric secure full-text search scheme for the Cloud. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 563-570). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.420
     
  • Bany Taha, M., Chaisiri, S., & Ko, R. K. L. (2015). Trusted tamper-evident data provenance. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 646-653). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.430
     
  • Chaisiri, S., Ko, R. K. L., & Niyato, D. (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 426-433). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.403
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). Message from the symposium chairs: TSCloud 2014. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. xxvi). Beijing, China: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.147
     
  • Ko, R., & Choo, K. K. R. (2015). Message from the workshop chairs of IEEE TSCloud 2015. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Vol. 1 (pp. xxx). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.337
     
  • Li, X., Joshi, C., Tan, A. Y. S., & Ko, R. K. L. (2015). Inferring user actions from provenance logs. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 742-749). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.442, {PDF}
     
  • Liesaputra V., Yongchareon S., Chaisiri S. (2015). Efficient Process Model Discovery Using Maximal Pattern Mining. In Motahari-Nezhad H., Recker J., Weidlich M. (eds) Business Process Management. BPM 2015. Lecture Notes in Computer Science, vol 9253. Springer, Cham {PDF}
     
  • Chase, J., Niyato, D., & Chaisiri S. (2015). Bring-Your-Own-Application (BYOA): Optimal Stochastic Application Migration in Mobile Cloud Computing. In Global Communications Conference (GLOBECOM), 2015 IEEE. 10.1109/GLOCOM.2015.7417575, {PDF}

2014

  • Benzie, J., McCarter, D., & Ko, R. K. L. (2014). Cyber security NZ SME Landscape: Report prepared for Vodafone NZ Ltd.
     
  • Tan, A. Y. S., Ko, R. K. L., & Ng, G. P. Y. (2014). OpenStack Café: a novel time-based user-centric resource management in the cloud. In Proc 2014 IEEE 3rd International Congress on Big Data (pp. 422-429). Anchorage, Alaska: IEEE. doi:10.1109/BigData.Congress.2014.68, {PDF}
     
  • Ko, R. K. L., & Will, M. A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In C. Kesselman (Ed.), Proc IEEE Seventh International Conference on Cloud Computing (pp. 881-889). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.121, {PDF}
     
  • Papanikolaou, N., Pearson, S., Mont, M. C., & Ko, R. K. L. (2014). A toolkit for automating compliance in Cloud computing services. Journal of Cloud Computing (Special Issue on Security Governance and SLAs in Cloud Computing), 3(1), 45-68. doi:10.1504/IJCC.2014.058830, {PDF}
     
  • Baek, Y., Ko, R. K. L., & Marsh, T. (2014). Trends and applications of serious gaming and social media. -: Springer. Retrieved from http://www.springer.com/us/book/9789814560252
     
  • Wu, Y., Ko, R., & Al-Dubai, A. (2014). Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks. Wireless Personal Communications, 75(3), 1587-1589. doi:10.1007/s11277-014-1649-7
     
  • Perez, G. M., Thampi, S. M., Ko, R., & Shu, L. (2014). Recent trends in computer networks and distributed systems security: Second International Conference, SNDS 2014. In Second International Conference on Security in Computer Networks and Distributed Systems (pp. 1-562). Conference held at Trivandrum, India: Springer. doi:10.1007/978-3-642-54525-2
     
  • Ko, R. K. L., Kirchberg, M., & Lee, B. S. (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7(11), 2183-2184. doi:10.1002/sec.1154
     
  • Ko, R. K. L., Tan, A. Y. S., & Ng, G. P. Y. (2014). Time for Cloud? Design and implementation of a time-based cloud resource management system. In C. Kesselman (Ed.), Proc IEEE 7th International Conference on Cloud Computing (pp. 530-536). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.77, {PDF}
     
  • Akram, R. N., Ko, R. K. L., & Law, T. F. (2014). Consumer-centric protection for online social networks. In 2014 IEEE 15th International Conference on Information Reuse and Integration (pp. 62-67). Redwood City, CA: IEEE Computer Society. doi:10.1109/IRI.2014.7051872, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2014). End-to-end secure and privacy preserving mobile chat application. In D. Naccache, & D. Sauveron (Eds.), Proc 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things Vol. LNCS 8501 (pp. 124-139). Heraklion, Crete, Greece: Springer Berlin Heidelberg. doi:10.1007/978-3-662-43826-8_9, {PDF}
     
  • Ko, R. K. L. (2014). Data accountability in Cloud systems. In S. Nepal, & M. Pathan (Eds.), Security, Privacy and Trust in Cloud Systems (pp. 211-238). Germany: Springer-Verlag Berlin Heidelberg. doi:10.1007/978-3-642-38586-5_7
     
  • Tan, A. Y. S., Ko, R. K. L., & Mendiratta, V. (2014). Virtual numbers for virtual machines?. In C. Kesselman (Ed.), Proc IEEE 7th International Conference on Cloud Computing (pp. 972-974). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.147, {PDF}
     
  • Ko, R. K. L., Tan, A. Y. S., & Gao, T. (2014). A mantrap-inspired, user-centric Data Leakage Prevention (DLP) approach. In Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom Vol. 2015-February (pp. 1033-1039). Singapore: IEEE. doi:10.1109/CloudCom.2014.23, {PDF}
     
  • Min, G., Varadharajan, V., Ko, R. K. L., Xiang, Y., Marmol, F. G., Ruj, S., . . . Yang, L. T. (2014). TSP 2013: Message from workshop chairs. In 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013. Zhangjiajie, China: IEEE Computer Society. doi:10.1109/HPCC.and.EUC.2013.350
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). Trusted Platform Module for Smart Cards. In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). 10.1109/NTMS.2014.6814058, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Sauveron, D. (2014). Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. In IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 10.1109/TrustCom.2014.57, {PDF}
     
  • Akram, R. N., Markantonakis, K. (2014) Rethinking the Smart Card Technology. In Tryfonas T., Askoxylakis I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. 10.1007/978-3-319-07620-1_20, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). Recovering from a lost digital wallet. In Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 (pp. 1615-1621). IEEE Computer Society. doi:10.1109/HPCC.and.EUC.2013.227
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). An introduction to the trusted platform module and mobile trusted module. In K. Markantonakis, & K. Mayes (Eds.), Secure Smart Embedded Devices, Platforms and Applications (pp. 71-93). New York, NY: Springer. doi:10.1007/978-1-4614-7915-4_4
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). An introduction to Java Card programming. In K. Markantonakis, & K. Mayes (Eds.), Secure Smart Embedded Devices, Platforms and Applications (pp. 497-513). New York, NY: Springer. doi:10.1007/978-1-4614-7915-4_22

2013

  • Tan, Y. S., Ko, R. K. L., & Holmes, G. (2013). Security and data accountability in distributed systems: a provenance survey. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp. 1571-1578). Zhangjiajie, China: IEEE. doi:10.1109/HPCC.and.EUC.2013.221
     
  • Suen, C. H., Ko, R. K. L., Tan, Y. S., Jagadpramana, P., & Lee, B. S. (2013). S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. In Proc 12th IEEE International Conference of Trust, Security and Privacy in Computing and Communication (pp. 594-602). Conference held at Melbourne, Australia: IEEE. doi:10.1109/TrustCom.2013.73
     
  • Ko, R., Martucci, L., & Kirchberg, M. (2013). TSCloud 2013: Message from the chairs. In Proc 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 (pp. xlvi). Melbourne, Australia. doi:10.1109/TrustCom.2013.266
     
  • Tan, Y. S., Ko, R. K. L., Jagadpramana, P., & Lee, B. S. (2013). 20130304774, Determining file allocation based on file operations. Retrieved from http://www.google.com/patents/US20130304774
     
  • Ko, R. K. L., Lee, S. S. G., & Rajan, V. (2013). Cloud computing vulnerability incidents: a statistical overview. Cloud Security Alliance Cloud Vulnerabilities Working Group. Retrieved from https://cloudsecurityalliance.org/, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2013). A secure and trusted channel protocol for the User Centric Smart Card Ownership Model. In Proc 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 336-345). Conference held at Melbourne, Australia: IEEE Computer Society. doi:10.1109/trustcom.2013.245
     
  • Akram, R. N., Markantonakis, K., Mayes, K. (2013) Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. In Qing S., Zhou J., Liu D. (eds) Information and Communications Security. ICICS 2013. Lecture Notes in Computer Science, vol 8233. Springer, Cham
     
  • Akram, R. N., & Markantonakis, K. (2013). Smart cards: State-of-the-art to future directions. In Signal Processing and Information Technology(ISSPIT), 2013 IEEE International Symposium on (pp. 000154-000162). Athens, Greece. doi:10.1109/ISSPIT.2013.6781871
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2013). Remote attestation mechanism for embedded devices based on physical unclonable functions. Cryptology and Information Security Series, 11, 107-121. doi:10.3233/978-1-61499-328-5-107
     
  • Msgna, M. G., Markantonakis, K., Mayes, K., & Akram, R. N. (2013). Subscriber centric conditional access system for pay-TV systems. In A. James, X. Fei, K. M. Chao, & J. Y. Chung (Eds.), Proc 2013 IEEE 10th International Conference on e-Business Engineering (pp. 450-455). Conference held at Coventry, UK: IEEE Computer Society. doi:10.1109/icebe.2013.70

2012

  • Ko, R. K. L., Lee, S. S. G., & Rajan, V. (2012). Understanding cloud failures. IEEE Spectrum, 49(12), 84. doi:10.1109/MSPEC.2012.6361788