SYE LOONG KEOH
Associate Professor
School of Computing Science
University of Glasgow, Singapore

SIT@RP Campus  >> 
SIT Building, Level 8
73 Woodlands Ave 9, S 737729

E: SyeLoong.Keoh (at) glasgow.ac.uk     
T: +65 6908 6042
Bio
Research
About
Teaching
Publications
Students
Last Updated: 05 Oct 2015 © SLK UoGS 
Calendar
Oct 26 - 27, 2015       Singapore  
Cloud Asia and ICCCRI Conference

Dec 8 - 11, 2015        Los Angeles
ACSAC Conference 

Dec 14 - 16, 2015       Morocco         
Information Assurance Security (IAS)

May 23 - 27, 2016       Kuala Lumpur
IEEE ICC Conference

Jun 17 - Jul 15, 2016   Glasgow UK
Overseas Immersion Program (OIP)


Links
Singapore Institute of Technology (SIT)
University of Glasgow Singapore
University of Glasgow
Imperial College London
Universiti Teknologi Malaysia
Republic Polytechnic Singapore

Philips Research
A*Star Research Institute

Internet Engineering Task Force (IETF)
 List of publications is also available at DBLP, Google Scholar, and  ResearchGate.


Monograph/Book Chapter:
  1. Ko, H., Keoh, S.L. and Jiong, J. (2016) Cloud Robot Security. Book Chapter in Security and Privacy in Cyber-Physical Systems: Foundations and Applications. Wiley. ISBN xxx (To Appear)          

  2. Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666           


Journals:
  1. Ko, H., Jiong, J. and Keoh, S.L. (2016)  Secure Service Virtualization in IoT by Dynamic Service Dependency Verification.  IEEE Internet of Things Journal, x(x), pp. xxx - xxx. ISSN 2327-4662.

  2. Ang, Y.H., Keoh, S.L. and Tang, Z. (2016)  Privacy Preserving Spatial and Temporal Aggregation of Smart Energy Data.  Journal of Information Assurance and Security (JIAS), 11(4), pp. 214 - 222. ISSN 1554-1010.

  3. Keoh, S.L., Kumar, S.S., and Tschofenig, H. (2014)  Securing the Internet of Things: A Standardization Perspective.  IEEE Internet of Things Journal, 1(3), pp 265 - 275. ISSN 2327-4662                

  4. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61 (3). pp. 527-542. ISSN 0929-6212    
     
  5. Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49 (11). pp. 174-180. ISSN 0163-6804

  6. Zhu, Y., Keoh, S.L., Sloman, M., and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6 (3). pp. 137-148. ISSN 1932-4537                                                          
  7. Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L., and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20 (3). pp. 277-295. ISSN 1532-0626


Conferences/Workshops:
  1. Lim, W.L.H., Lum, J.T.W., Yeo, I.J.W., and Keoh, S.L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: IEEE 1st International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems (AwareCities), PerCom Workshop, 14 Mar 2016, Sydney, Australia.

  2. Keoh, S.L., Ang, Y.H., and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), 14 - 16 Dec 2015, Marrakech, Morocco. [Best Paper Award]

  3. Keoh, S.L., Au, K.W.K and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop, in conjunction with the 31st Annual Computer Security Applications Conference (ACSAC), 8 Dec 2015, Los Angeles, California, USA.  

  4. Chuan, W.B., Ren, S.Q., Keoh, S.L., and Aung, K.M.M. (2015) Flexible yet Secure De-duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), 26 - 27 Oct 2015, Singapore. 

  5. Keoh, S.L., and Tang, Z. (2014) Towards Secure End-to-End Data Aggregation in AMI through Delayed-Integrity-Verification. In: IEEE 10th International Conference on Information Assurance and Security (IAS), 27 - 29 Nov 2014, Okinawa, Japan.

  6. Soni, A., Keoh, S.L., Kumar, S.S., and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, 16-17 Sep 2013, Leicester, UK.                                                                           
  7. Garcia-Morchon, O., Keoh, S.L., Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F., and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17 Apr 2013, Budapest, Hungary.                                                                               
  8. Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S., and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-28 Mar 2013, Barcelona, Spain.                                                                           
  9. Brachmann, M., Keoh, S.L., Morchon, O.G., and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), 30 Jul - 2 Aug 2012, Munich, Germany.                                                                     
  10. Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), 5 - 9 Jun 2011, Kyoto, Japan.                                                                      
  11. Keoh, S.L., Asim, M., Kumar, S.S., and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), 12 Jun 2011, San Francisco, CA, USA.    
  12. Keoh, S.L., Lupu, E., and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, 9-13 Mar 2009, Galveston, TX, USA.                                                                                      
  13. Keoh, S.L., and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management , 9 Nov 2009, Chicago, IL, USA.                                                                             
  14. Zhu, Y., Sloman, M., Lupu, E., and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., 1-3 Apr 2009, London, UK.                                                                        
  15. Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L., Lobo, J., and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), 1-3 Jul 2008, Bremen, Germany.                                                                        
  16. Yanmin, Z., Keoh, S.L., Sloman, M., Lupu, E., Yu, Z., Dulay, N., and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 29 Sep - 2 Oct 2008, Atlanta, GA, USA.                                                                       
  17. Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N., and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08. , 8-10 Dec 2008, Melbourne, Australia.                                                               
  18. Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N., and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 1-3 Jun 2008, Hong Kong, China.                                                           
  19. Keoh, S.L., Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S., and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 6-10 Aug 2007, Philadelphia, PA, USA.                                                                                                           
  20. Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), 26-28 March 2007, Aachen, Germany.                                                    
  21. Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L., Twidle, K., Sloman, M., Heeps, S., Strowes, S., and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, 9-11 Jul 2007, Cambridge, MA, USA.                                                             
  22. Keoh, S.L., and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, 5-8 April 2005, Boppard, Germany.                                                                         
  23. Keoh, S.L., Lupu, E., and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), 6-10 Dec, 2004, Tucson, AZ, USA.                                                                     
  24. Keoh, S.L., and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, 20-23 Jun 2004, Paris, France.                                                                                                
  25. Keoh, S.L., and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), 30-31 Oct, 2002, Toulouse, France.              


Internet Drafts:
  1. Kumar, S.S., Keoh, S.L., and Garcia-Morchon, O. (2013) DTLS Relay for Constrained Environments. draft-kumar-dice-dtls-relay                       
  2. Keoh, S.L., Kumar, S.S., and Shelby, Z. (2013) Profiling of DTLS for CoAP-based IoT Applications. draft-keoh-dice-dtls-profile-iot                                                                
  3. Keoh, S.L., Kumar, S.S., Garcia-Morchon, O., and Dijk, E. (2013) DTLS-based Multicast Security for Low-Power and Lossy Networks. draft-keoh-dice-multicast-security                                                                                       
  4. Kumar, S.S., Keoh, S.L., and Tschofenig, H. (2013) A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol. draft-ietf-lwig-tls-minimal                                                                                                                
  5. Keoh, S.L., Kumar, S.S., and Garcia-Morchon, O. (2013) Securing the IP-based Internet of Things with DTLS. draft-keoh-lwig-dtls-iot                                            
  6. Garcia-Morchon, O., Kumar, S.S., Keoh, S.L., Hummen, R., and Struik, R. (2013) Security Considerations in the IP-based Internet of Things. draft-garcia-core-security


Patents:
  1. Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets.                                                                                       
  2. Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems.                           
  3. Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations.                                                      
  4. Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption.      

Others:
  1. Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L., Lupu, E., Schaeffer-Filho, A.E., Sloman, M., and Sventek, J. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.