Ryan Ko
Ryan Ko
Professor, Director & Chair - UQ Cyber Security, University of Queensland
Verified email at uq.edu.au - Homepage
TitleCited byYear
Business process management (BPM) standards: a survey
RKL Ko, SSG Lee, EW Lee
Business Process Management Journal, 2009
TrustCloud: A framework for accountability and trust in cloud computing
RKL Ko, P Jagadpramana, M Mowbray, S Pearson, M Kirchberg, Q Liang, ...
2011 IEEE World Congress on Services, 584-588, 2011
A computer scientist's introductory guide to business process management (BPM)
XRDS: Crossroads, The ACM Magazine for Students 15 (4), 11-18, 2009
Towards achieving accountability, auditability and trust in cloud computing
RKL Ko, BS Lee, S Pearson
International conference on advances in computing and communications, 432-444, 2011
Flogger: A file-centric logger for monitoring file access and transfers within cloud computing environments
RKL Ko, P Jagadpramana, BS Lee
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
How to track your data: The case for cloud computing provenance
OQ Zhang, M Kirchberg, RKL Ko, BS Lee
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
Progger: An efficient, tamper-evident kernel-space logger for cloud data provenance tracking
RKL Ko, MA Will
2014 IEEE 7th International Conference on Cloud Computing, 881-889, 2014
From system-centric to data-centric logging-accountability, trust & security in cloud computing
RKL Ko, M Kirchberg, BS Lee
2011 Defense Science Research Conference and Expo (DSR), 1-4, 2011
S2logger: End-to-end data tracking mechanism for cloud data provenance
CH Suen, RKL Ko, YS Tan, P Jagadpramana, BS Lee
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
Cloud computing vulnerability incidents: A statistical overview
R Ko, SSG Lee, V Rajan
Cloud Security Alliance, 2013
Security and data accountability in distributed systems: A provenance survey
YS Tan, RKL Ko, G Holmes
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
Formal concept discovery in semantic web data
M Kirchberg, E Leonardi, YS Tan, S Link, RKL Ko, BS Lee
International Conference on Formal Concept Analysis, 164-179, 2012
How to track your data: Rule-based data provenance tracing algorithms
OQ Zhang, RKL Ko, M Kirchberg, CH Suen, P Jagadpramana, BS Lee
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
Tracking of data leaving the cloud
YS Tan, RKL Ko, P Jagadpramana, CH Suen, M Kirchberg, TH Lim, ...
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
Business-OWL (BOWL)—A Hierarchical task network ontology for dynamic business process decomposition and formulation
RKL Ko, EW Lee, SG Lee
IEEE Transactions on Services Computing 5 (2), 246-259, 2011
Understanding cloud failures
RKL Ko, SSG Lee, V Rajan
IEEE Spectrum 49 (12), 84-84, 2012
Data accountability in cloud systems
Security, Privacy and Trust in Cloud Systems, 211-238, 2014
A global, empirical analysis of the shellshock vulnerability in web applications
B Delamore, RKL Ko
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1129-1135, 2015
A toolkit for automating compliance in cloud computing services.
N Papanikolaou, S Pearson, MC Mont, RKL Ko
IJCC 3 (1), 45-68, 2014
The cloud security ecosystem: technical, legal, business and management issues
R Ko, R Choo
Syngress, 2015
The system can't perform the operation now. Try again later.
Articles 1–20