SYE LOONG KEOH
Assistant Professor
School of Computing Science
University of Glasgow, Singapore

Republic Polytechnic  >>
Pod E1 Level 8
9 Woodlands Ave 9, S 738964

E: SyeLoong.Keoh (at) glasgow.ac.uk
T: +65 6697 0968
Bio
Research
About
Teaching
Publications
Students
Last Updated: 22 May 2014 © SLK UoGS 
Calendar
Mar 02 - 07, 2014       London UK  
89th IETF Meeting

Apr 21 - 22, 2014       Singapore
IoTAsia Exhibition & Conference

Jun 15 - Jul 10, 2014   Glasgow UK
Overseas Immersion Program (OIP) 

Jul 20 - 25, 2014       Toronto Canada
90th IETF Meeting 

Nov 9 - 14, 2014        Hawaii USA
91st IETF Meeting


Links
Singapore Institute of Technology (SIT)
University of Glasgow Singapore
University of Glasgow
Imperial College London
Universiti Teknologi Malaysia

Philips Research
A*Star Research Institute

Internet Engineering Task Force (IETF)
 List of publications is also available at DBLP, Google Scholar, and  ResearchGate.


Monograph:
  1. Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666           


Journals:
  1. Keoh, S.L., Kumar, S.S., and Tschofenig, H. (2014)  Securing the Internet of Things: A Standardization Perspective.  IEEE Internet of Things Journal, 1 (3), pp 265 - 275. ISSN 2327-4662                

  2. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61 (3). pp. 527-542. ISSN 0929-6212     
  3. Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49 (11). pp. 174-180. ISSN 0163-6804                                                                                                             
  4. Zhu, Y., Keoh, S.L., Sloman, M., and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6 (3). pp. 137-148. ISSN 1932-4537                                                          
  5. Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L., and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20 (3). pp. 277-295. ISSN 1532-0626


Conferences/Workshops:
  1. Soni, A., Keoh, S.L., Kumar, S.S., and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, 16-17 Sep 2013, Leicester, UK.                                                                           
  2. Garcia-Morchon, O., Keoh, S.L., Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F., and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 17 Apr 2013, Budapest, Hungary.                                                                               
  3. Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S., and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-28 Mar 2013, Barcelona, Spain.                                                                           
  4. Brachmann, M., Keoh, S.L., Morchon, O.G., and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), 30 Jul - 2 Aug 2012, Munich, Germany.                                                                     
  5. Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), 5 - 9 Jun 2011, Kyoto, Japan.                                                                      
  6. Keoh, S.L., Asim, M., Kumar, S.S., and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), 12 Jun 2011, San Francisco, CA, USA.    
  7. Keoh, S.L., Lupu, E., and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, 9-13 Mar 2009, Galveston, TX, USA.                                                                                      
  8. Keoh, S.L., and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management , 9 Nov 2009, Chicago, IL, USA.                                                                             
  9. Zhu, Y., Sloman, M., Lupu, E., and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., 1-3 Apr 2009, London, UK.                                                                        
  10. Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L., Lobo, J., and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), 1-3 Jul 2008, Bremen, Germany.                                                                        
  11. Yanmin, Z., Keoh, S.L., Sloman, M., Lupu, E., Yu, Z., Dulay, N., and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 29 Sep - 2 Oct 2008, Atlanta, GA, USA.                                                                       
  12. Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N., and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08. , 8-10 Dec 2008, Melbourne, Australia.                                                               
  13. Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N., and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 1-3 Jun 2008, Hong Kong, China.                                                           
  14. Keoh, S.L., Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S., and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 6-10 Aug 2007, Philadelphia, PA, USA.                                                                                                           
  15. Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), 26-28 March 2007, Aachen, Germany.                                                    
  16. Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L., Twidle, K., Sloman, M., Heeps, S., Strowes, S., and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, 9-11 Jul 2007, Cambridge, MA, USA.                                                             
  17. Keoh, S.L., and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, 5-8 April 2005, Boppard, Germany.                                                                         
  18. Keoh, S.L., Lupu, E., and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), 6-10 Dec, 2004, Tucson, AZ, USA.                                                                     
  19. Keoh, S.L., and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, 20-23 Jun 2004, Paris, France.                                                                                                
  20. Keoh, S.L., and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), 30-31 Oct, 2002, Toulouse, France.              


Internet Drafts:
  1. Kumar, S.S., Keoh, S.L., and Garcia-Morchon, O. (2013) DTLS Relay for Constrained Environments. draft-kumar-dice-dtls-relay                       
  2. Keoh, S.L., Kumar, S.S., and Shelby, Z. (2013) Profiling of DTLS for CoAP-based IoT Applications. draft-keoh-dice-dtls-profile-iot                                                                
  3. Keoh, S.L., Kumar, S.S., Garcia-Morchon, O., and Dijk, E. (2013) DTLS-based Multicast Security for Low-Power and Lossy Networks. draft-keoh-dice-multicast-security                                                                                       
  4. Kumar, S.S., Keoh, S.L., and Tschofenig, H. (2013) A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol. draft-ietf-lwig-tls-minimal                                                                                                                
  5. Keoh, S.L., Kumar, S.S., and Garcia-Morchon, O. (2013) Securing the IP-based Internet of Things with DTLS. draft-keoh-lwig-dtls-iot                                            
  6. Garcia-Morchon, O., Kumar, S.S., Keoh, S.L., Hummen, R., and Struik, R. (2013) Security Considerations in the IP-based Internet of Things. draft-garcia-core-security


Patents:
  1. Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets.                                                                                       
  2. Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems.                           
  3. Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations.                                                      
  4. Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption.      

Others:
  1. Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L., Lupu, E., Schaeffer-Filho, A.E., Sloman, M., and Sventek, J. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.