Breadcrumbs

Ryan Ko

Qualifications: BEng(Hons) PhD Nanyang Technological University, Singapore CCSP FCSA

Contact Details

Extension: 4704
Website: https://researchers.uq.edu.au/researcher/23784

About Ryan

Note: Professor Ryan Ko has currently taken up a new position at the University of Queensland and is no longer with the University of Waikato.

Research Interests

  • Cloud Computing Security and Trust (Cloud Data Provenance, Data Tracking)
  • Practical Homomorphic Encryption
  • Cyber Security (Internet of Things, Mobile Devices, Autonomous Vehicles)
  • Linked Data Analysis
  • Artificial Intelligence Planning
  • Exploratory Visualisation Techniques
  • Business Process Modeling
  • Service-Oriented Computing.

External Research Grants

  • Co-PI, NZ Law Foundation - Identifying Encryption Principles for New Zealand (ENCRYPT NZ), Michael Dizon (PI), Ryan Ko, Wayne Rumbles, Amount: NZD 59,000 (from September 2017).
  • Science Leader/ Principal Investigator, NZ Ministry of Business Innovation and Employment Science Funding (MBIE) (Enabling Technologies – High Value Manufacturing and Services) – STRATUS (Security Technologies Returning Accountability, Trust and User-centric Services in the Cloud, NZD12.23 million (incl. GST) over 6 years (from October 2014)
  • Co-PI, Seeding and Scoping New Research Excellence 2016-2018,  Ngā Pae o te Māramatanga (NPM) Kia Ārohi Kia Mārama; Scoping Excellence research proposal, Tahu Kukutai (PI), Maui Hudson,Ryan Ko, Wayne Rumbles, Amount: NZD59,985 (excl. GST)
  • Co-PI, Office of the Privacy Commissioner – Privacy Good Research Fund 2015/2016, "Parent-Centric Privacy Framework for a Safe Cyber Environment for Children", Sivadon Chaisiri, Ryan Ko, Amount: NZD 21,799
  • Co-PI, InternetNZ Internet Research Funding 2015, "Survey of New Zealanders' Mobile Internet Security Awareness" Sivadon Chaisiri, Ryan Ko, Amount: NZD 9,000
  • Associate Investigator, Education New Zealand, International Education Growth Fund, “Promoting a New Master of Cyber Security Degree and Establishing Long-term Partnerships in South East Asia”, NZD66,000 for project, support from ENZ NZD33,000.
  • Primary Investigator, Amazon Web Services Education Grant 2014
  • Primary Investigator, Fulbright Specialist Award 2014

Service

Journal Editorial Boards

  • 2015-2016, Assoc. Editor, Computers & Electrical Engineering (Elsevier)
  • 2014-, Area Editor, Australasian Journal of Information Systems (EBSCO)
  • 2014-, Area Editor (Cyber Security and Big Data), Proceedings of Open Library of Engineering Sciences (Open Access Journal)
  • 2013-, Assoc. Editor, Intl J. of Semantic & Infrastructural Services (InderScience)
  • 2013-, Assoc. Editor, Int’l J. of Applied Pattern Recognition (Inderscience).
  • 2011-, Assoc. Editor, Security & Communication Networks Journal (Wiley)
  • 2011-, Assoc. Editor, Intl. Journal of Cloud Applications & Computing
  • 2009-2011, Editor, ACM Crossroads (XRDS)
  • 2009, Assoc. Editor (Asia Pacific), ACM Crossroads (XRDS)

Guest Editor in SCI-Indexed Journal Special Issues

  • 2014, Guest Editor, Special Issue on Advances in Trust, Security and Privacy for Wireless Communication Networks, Wireless Personal Communications (Springer)
  • 2011-2013, Guest Editor, SI on Trust & Security in Cloud Computing, Security & Communication Networks Journal (Wiley)
  • 2013-, Guest Editor, SI on Advances in Trust, Security & Privacy for Wireless Communication Networks, Wireless Personal Communications (Springer)
  • 2013-, Guest Editor, SI on Trends, Applications and Security in Computing & Communications, Int’l Journal of Computers & Electrical Engineering (Elsevier)
  • 2013 – Editorial Advisory Board, Big Data Management, Technologies & Applications, Edited Book, IGI Global

ISO International Standards Editing

  • 2016-, Editor, ISO/IEC JTC 1/SC 27 WG 4 NWIP on “Security Guidelines on Design and Implementation of Virtualized Servers”
  • 2016-, Member, Standards Australia and Standards New Zealand IT-012 Committee, Mirror committee for ISO SC 27
  • 2015-2016, Rapporteur, ISO/IEC JTC 1/SC 27 WG 4 “Study Period on Security Guidelines on Design and Implementation of Virtualized Servers”
  • 2015, Rapporteur, ISO/IEC JTC 1/SC 27 WG 4 “Study Period on Virtualization Security”
  • 2015-, Member, ISO/IEC JTC 1/SC 27 Committee
  • 2015-, Member, Security and Privacy Standards Technical Committee, Standards Productivity and Innovation Board (SPRING Singapore) Information Technology Standards Committee

Industry Advisory Boards/ Panels

  • 2016-, LIC (Livestock Improvement) Technology Advisory Board Member, Ruakura, NZ
  • 2016, Panel Member, MCDA Workshop for proposed New Zealand Computer Emergency Response Team (NZ CERT), National Cyber Policy Office, Beehive, Wellington.
  • 2016, National Body Representative, Security & Privacy Stds. Technical Comm. (SPSTC), Singapore, for International Organization for Standardization (ISO) SC27.
  • 2016, Assessor, Assessment Panel for MBIE Science Investment (Smart Ideas) Proposals
  • 2015, Advisor, NYRIAD Ltd
  • 2014-, Chair, Science Leadership Team, STRATUS
  • 2014-2015, Chair, Industry Advisory Group, STRATUS
  • 2015, Assessor, Assessment Panel for MBIE Science Investment (Smart Ideas) Proposals
  • 2015, Judge, Information Security Awards New Zealand (ISANZ 2015)
  • 2015, Rapporteur, Virtualization Security Study Period, ISO/IEC JTC1/SC27 WG4
  • 2015, Committee Member, ISO/IEC JTC1/SC27 Standardisation Sub-Committee
  • 2015, Assessment Panel Member, MBIE Smart Ideas Phase 1 Concept Proposals.
  • 2015, Invited Participant (representing Australasia), Global Conference on CyberSpace (GCCS 2015), The Hague, the Netherlands.
  • 2015, National Body Representative, Security & Privacy Stds. Technical Comm. (SPSTC), Singapore, for International Organization for Standardization (ISO) SC27.
  • 2014, Subject Matter Expert, Certified Cloud Security Professional (CCSP) Standard Setting Workshop, (ISC)2, Orlando, Florida.
  • 2014, Panel Member, Cyber Security Strategy Workshop, National Cyber Policy Office, The Treasury, Wellington.
  • 2014, Panel Member, Cybercrime Workshop, National Cyber Policy Office, Pipitea House, Wellington.
  • 2014, Subject Matter Expert, Test Pull Workshop, Exam Development for new (ISC)2-CSA Certification for Cloud Security Professionals, Atlanta, Georgia.
  • 2014, Subject Matter Expert, Item Writing Workshop, Exam Development for new (ISC)2-CSA Certification for Cloud Security Professionals, Clearwater, Florida.
  • 2013, Subject Matter Expert, Item Writing Workshop, Exam Development for new (ISC)2-CSA Certification for Cloud Security Professionals, San Francisco, CA.
  • 2013-, Research Advisor, Cloud Security Alliance (Asia Pacific Region)
  • 2013-, Co-Founder/ Chair, CSA Cloud Vulnerabilities Working Group.
  • 2013, Subject Matter Expert, Job Task Analysis Workshop/ Exam Development for new (ISC)2-CSA Certification for Cloud Security Professionals, Orlando, Florida.
  • 2012-2013, Board of Directors, Cloud Security Alliance (CSA) New Zealand
  • 2011-2013, Co-Founder/ Chair, CSA Cloud Data Governance Working Group. (1st research working group formed by an Asia Pacific chapter (i.e. Singapore chapter)
  • 2011-2012, Board of Directors (Director of Research), CSA Singapore
  • 2012, Industry Advisory Committee, Singapore Cloud Computing Standards Development, Infocomm Development Authority (IDA) of Singapore.
  • 2011, Judging Panel, Finals, UK National Cyber Security Challenge 2011.

Conference/Symposium/Workshop Chairing (Recent)

  • 2016, Programme Chair, 6th IEEE Int’l Symposium on Trust & Security in Cloud Computing (TSCloud), Tianjin, China.
  • 2016, Programme Co-Chair, 16th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2016), Granada, Spain.
  • 2016, Programme Co-Chair - Security Track, 14th International Conference on Privacy Security and Trust, Auckland, NZ.
  • 2015, Programme Chair, 5th IEEE Int’l Symposium on Trust & Security in Cloud Computing (TSCloud), Helsinki, Finland.
  • 2015, Programme Chair, 3rd CSA Asia Pacific Congress, Guangzhou, China.
  • 2015, Workshop Co-Chair, The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), Zhangjiajie, China.
  • 2014,Publicity Chair,7th ACM/IEEE Utility & Cloud Computing Conference (UCC), UK
  • 2014, Chair, 4th IEEE Int’l Symposium on Trust & Security in Cloud Computing (IEEE TSCloud 2014), Beijing, China.
  • 2014, Programme Co-Chair, 2nd Int’ Conf. on Security in Computer Networks and Distributed Systems (SNDS-2014), Trivandrum, India.
  • 2013, Programme Co-Chair, 2nd Cloud Security Alliance Asia Pacific Chief Information Security Officer (CISO) Forum 2013, Macau.
  • 2013, PC Chair, 1st Cloud Security Alliance APAC Congress 2013, Singapore.
  • 2013, Chair, 3rd IEEE Int’l Symposium on Trust & Security in Cloud Computing (IEEE TSCloud 2013), Melbourne, Australia.
  • 2013, Workshop Chair, 15th IEEE Int’l Conference on High Performance Computing & Communications (IEEE HPCC 2013), Zhangjiajie, China.
  • 2013, Workshop & Special Sessions Chair, 2nd Int’l Conference on Advances in Computing, Communications & Informatics (ICACCI 2013), Mysore, India.
  • 2012, PC Chair, 2nd IEEE Int’l Symposium on Trust & Security in Cloud Computing, (IEEE TSCloud 2012), Liverpool, UK.
  • 2012, PC Chair, 4th IEEE Int’l Symposium on UbiSafe Computing (UbiSafe), Liverpool.
  • 2011, Co-Founder/ Co-Chair, 1st IEEE Int’l Workshop on Trust & Security in Cloud Computing, (IEEE TSCloud 2011), Changsha, China.

Technical Programme Committee Member (Recent)

  • 2017, 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), 9-12 January 2016, Las Vegas, USA (In conjunction with the Consumer Electronic Show 2016) (CORE Rank A)
  • 2016, ACSW 2017 (The Australiasian Computer Science Week
    Conference) Austalasian Information Security Conference, Geelong, Australia
  • 2016, 2nd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys2016)
  • 2016, 1st International Workshop on Trust, Security and Privacy for Big Data (BigTrust 2016), December 14-16, 2016, Granada, Spain
  • 2016, 9th International Conference on Utility and Cloud Computing, Shanghai, China.
  • 2016, 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016), Zhangjiajie, China
  • 2015, 8th IEEE International Conference on Internet of Things (iThings 2015), Sydney, Australia.
  • 2015, 5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures (C&TC 2015), Rhodes, Greece
  • 2015, The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015), Zhangjiajie, China.
  • 2015, 14th IEEE Int’l Conf. on Trust, Security & Privacy in Computing & Communications (IEEE TrustCom 2015), Helsinki, Finland. (CORE Rank A)
  • 2015, 13th International Conference on Service Oriented Computing (ICSOC 2015), Goa, India.
  • 2015, 10th International Conference on Evaluation of Novel Software Approaches to Software Engineering (ENASE 2015), Barcelona, Spain.
  • 2014, 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), London, UK. (CORE Rank A)
  • 2014, Applications and Technologies in Cyber Security (ATCS) Workshop, Beijing, China.
  • 2014, 12th International Conference on Service Oriented Computing, Paris, France. (CORE Rank A)
  • 2014, 5th International Workshop on Wireless Networks and Multimedia (WNM-2014), Dalian, China.
  • 2014, 4th Cloud and Trusted Computing 2014, International Conference on
Secure Virtual Infrastructures (ex-DOA), Amantea, Italy.
  • 2014, International Workshop on Trust in Cloud computing (IWTCC), London, UK.
  • 2014, 2nd International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, Kerala, India.
  • 2014, 13th IEEE Int’l Conf. on Trust, Security & Privacy in Computing & Communications (IEEE TrustCom 2014), Beijing, China. (CORE Rank A)
  • 2014, 9th IEEE Int’l Contest on Cloud Computing (CLOUD Cup), Alaska, USA.
  • 2014, 5th International Workshop on Wireless Networks and Multimedia (WNM-2014), Dalian, China.
  • 2014, TrustData Workshop 2014, Dalian, China.
  • 2013, 8th IEEE Int’l Contest on Cloud Computing (CLOUD Cup), Santa Clara, CA.
  • 2013 IEEE Int’l Conf. on Internet of Things (IEEE iThings 2013), Beijing, China.
  • 2013, IEEE ICPADS Workshop on Cloud Services & Systems (CSS 2013), Seoul.
  • 2013, 2nd Asian Conf. on Information Systems (ACIS 2013). Phuket, Thailand.
  • 2013, DOA-Trusted Cloud 2013, 3rd Int’l Symp. on Secure Virtual Infrastructures, OnTheMove Federated Conferences & Workshops 2013,Graz, Austria.
  • 2013, 8th IEEE International Contest on Cloud Computing (CLOUD Cup 2013) (CORE Rank A)
  • 2013, 12th IEEE Int’l Conf. on Trust, Security & Privacy in Computing & Communications (IEEE TrustCom 2013), Melbourne, Australia. (CORE Rank A)
  • 2013, 4th Int’l Workshop on Wireless Networks & Multimedia (WNM 2013), in conj. with 11th IEEE ISPA, Melbourne, Australia.
  • 2013, 4th Int’l Conf. on Cloud Computing, GRIDs & Virtualization, Valencia, Spain.
  • 2013, 9th Asia Pacific Conf. on Conceptual Modeling (APCCM 2013), Adelaide.
  • 2012, 10th Int’l Conf. on Services Oriented Computing (ICSOC 2012), Shanghai.
  • 2012, 7th IEEE Service Cup, in conj. with IEEE ICWS 2012, Hawaii, USA. (CORE Rank A)
  • 2012, 18th IEEE Int’l Conf. on Parallel & Distributed Systems (ICPADS-12),Singapore.
  • 2012, 11th IEEE Int’l Conf. on Trust, Security & Privacy in Computing & Communications (IEEE TrustCom-12), Liverpool, UK. (CORE Rank A)
  • 2012, 3rd IEEE Int’l Workshop on Wireless Networks & Multimedia, Liverpool.
  • 2012, 8th Asia Pacific Conf. on Conceptual Modeling (APCCM 2012), Melbourne.

Reviewing Services

  • IEEE Computer
  • IEEE Trans. on Cloud Computing
  • IEEE Trans. on Computers
  • Computer Networks (Elsevier)
  • Future Generation Computing Systems (Elsevier)
  • IEEE Trans. Parallel and Distributed Systems
  • IEEE Trans. on Knowledge & Data Engineering
  • IEEE Spectrum, Information Systems (Elsevier)
  • Journal of Cloud Computing (Inderscience)
  • Security & Communication Networks (Wiley)
  • IEEE Trans. on Services Computing
  • Australasian Journal of Information Systems
  • Business Process Management Journal (Emerald)
  • ACM XRDS (ACM Crossroads)

Keynote Addresses/ Invited Speaker (Recent)

  • Invited Speaker, "Closing the Gap: Protecting Business Capabilities Against Security Threats", NZ Cloud Computing and Hybrid IT Forum, 6 September 2016, Rendezvous Hotel, Auckland, NZ.
  • Keynote Speaker (addressing NZ Members of Parliament), “Returning Data Control to Users – The Next Frontier For Cloud Security Research”, Royal Society of New Zealand Speakers Science Forum, 2 March 2016, the Beehive (NZ Parliament Building), Wellington, NZ.
  • Keynote Speaker, “User-controlled Cloud Security Solutions: The Next Frontier in Cyber Security”, International Conference on Cloud Computing Research and Innovation (ICCCRI 2016), 4-5 May 2016, Singapore
  • Invited Speaker, “Securing the cloud by empowering its users - Introducing the NZ STRATUS Research Project”, NZ Cloud Computing Conference, September 2015, Auckland, NZ.
  • Invited Speaker, “The Holy Grails of Returning Control of Data to Cloud Users”, Data Privacy Asia, 25-27 August 2015, Singapore.
  • Invited Panellist, “Privacy versus Protection: Using Private Data for Public Good – Maintaining the Balance”, Data Privacy Asia, 25-27 August 2015, Singapore.
  • Invited Panellist, “Cloud Data Privacy and Data Sovereignty”, Data Privacy Asia, 25-27 August 2015, Singapore.
  • Session Chair, “Data control in cloud environments”, NetHui 2015, July 2015, Auckland, NZ.
  • Invited Panellist, “Cloud Security Research”, CSA ASEAN Summit, 11-12 June 2015, Bangkok, Thailand
  • Invited Panellist, “Smart Social”, CSA ASEAN Summit, 11-12 June 2015, Bangkok, Thailand
  • Invited Speaker, “An Overview of New Zealand and University of Waikato Cyber Security Strategies and Research”, 28 April 2015, CSA APAC Education Council Seminar, Singapore.
  • Invited Panellist, “Will the Cloud ever be secure”, Industry Panel, IEEE 6th International Conference on Cloud Computing Technology and Science, 17 Dec 2014, Singapore.
  • Invited Speaker, “Don’t Get Bit-ten - How Safe Are You Online?”, University of Waikato Winter Lecture Series, 13 August 2014, University of Waikato, Hamilton, New Zealand.
  • Invited Speaker, “Swords against Atomic Bombs - Fundamental Gaps and Opportunities in Cyber Security Research and Development”, Institute of IT Professionals (IITP) New Zealand Public Lecture, 17 June 2014, University of Waikato, Hamilton, New Zealand.
  • Invited Speaker, “Cloud Security Research in Motion”, ASEAN CSA & OWASP Summit, Bangkok, 3-4 June 2014, Bangkok.

Soli Deo gloria

Research Supervised

Recent Publications

  • Garae, J., Ko, R. K. L., Apperley, M., & Schlickmann, S. J. (2018). Security visualization intelligence model for law enforcement investigations. In B. Cusack, & R. Lutui (Eds.), Proc 2018 Cyber Forensic & Security International Conference (2018 CFSIC) (pp. 165-177). Conference held Tonga.

  • Ko, R., Rodrigues, M., Ladur, A., & Scoon, C. (2018). Towards one global privacy law. Asia Global Online. Retrieved from http://www.asiaglobalonline.hku.hk/towards-one-global-privacy-law/ Open Access version: https://hdl.handle.net/10289/11993

  • Garae, J., Ko, R. K. L., & Apperley, M. (2018). A full-scale security visualization effectiveness measurement and presentation approach. In Proc 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 639-650). Los Alamitos, California: IEEE Computer Society. doi:10.1109/TrustCom/BigDataSE.2018.00095

  • Phua, T. W., & Ko, R. (2018). Data provenance for Big Data security and accountability. In S. Sakr, & A. Zomaya (Eds.), Encyclopedia of Big Data Technologies (pp. 6 pages). Cham: Springer. doi:10.1007/978-3-319-63962-8_237-1

Find more research publications by Ryan Ko