default search action
Gail-Joon Ahn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Erin Lanus, Charles J. Colbourn, Gail-Joon Ahn:
Guaranteeing anonymity in attribute-based authorization. J. Inf. Secur. Appl. 87: 103895 (2024) - [c182]Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. CODASPY 2024: 55-65 - [c181]Sukwha Kyung, Jaejong Baek, Gail-Joon Ahn:
Unveiling SDN Controller Identity through Timing Side Channel. NoF 2024: 169-177 - [c180]Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. RAID 2024: 49-64 - [c179]Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili:
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. SP 2024: 350-368 - 2023
- [j66]Carlos E. Rubio-Medrano, Pradeep Kumar Duraisamy Soundrapandian, Matthew Hill, Luis Claramunt, Jaejong Baek, Geetha S, Gail-Joon Ahn:
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android. Inf. Syst. Frontiers 25(2): 529-548 (2023) - [c178]Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. DSN 2023: 261-273 - [c177]Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. SACMAT 2023: 79-90 - [i6]Erin Lanus, Charles J. Colbourn, Gail-Joon Ahn:
Guaranteeing Anonymity in Attribute-Based Authorization. CoRR abs/2310.04896 (2023) - 2022
- [j65]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - [c176]Haehyun Cho, Jinbum Park, Adam Oest, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
ViK: practical mitigation of temporal memory safety violations through object ID inspection. ASPLOS 2022: 271-284 - [c175]Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. CCS 2022: 3165-3179 - [c174]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - 2021
- [j64]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. DTRAP 2(3): 21:1-21:23 (2021) - [j63]Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [c173]Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. AsiaCCS 2021: 407-420 - [c172]Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. EuroS&P 2021: 704-706 - [c171]Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. EuroS&P 2021: 713-715 - [c170]Pradeep Kumar Duraisamy Soundrapandian, Tiffany Bao, Jaejong Baek, Yan Shoshitaishvili, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn:
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts. HICSS 2021: 1-10 - [c169]Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. NDSS 2021 - [c168]Carlos E. Rubio-Medrano, Matthew Hill, Luis M. Claramunt, Jaejong Baek, Gail-Joon Ahn:
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android. SKM 2021: 23-36 - [c167]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. SP 2021: 1109-1124 - [c166]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i5]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. CoRR abs/2103.12843 (2021) - 2020
- [c165]Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c164]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. eCrime 2020: 1-10 - [c163]Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture. MobiSys 2020: 107-120 - [c162]Carlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. SACMAT 2020: 131-144 - [c161]Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems. TPS-ISA 2020: 319-322 - [c160]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c159]Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020 - [e20]Qi Alfred Chen, Ziming Zhao, Gail-Joon Ahn:
AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020. ACM 2020, ISBN 978-1-4503-7113-1 [contents]
2010 – 2019
- 2019
- [j62]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [j61]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c158]Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. CCS 2019: 1955-1970 - [c157]Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDNSOC: Object Oriented SDN Framework. SDN-NFV@CODASPY 2019: 7-12 - [c156]Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c155]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c154]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - [c153]Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - [c152]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers:
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. IEEE Symposium on Security and Privacy 2019: 1344-1361 - [c151]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. USENIX Security Symposium 2019: 1327-1340 - [e19]Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9 [contents] - [e18]Ziming Zhao, Qi Alfred Chen, Gail-Joon Ahn:
Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6180-4 [contents] - [e17]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - 2018
- [j60]Haehyun Cho, Jeong Hyun Yi, Gail-Joon Ahn:
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. IEEE Access 6: 71229-71240 (2018) - [j59]Hyunki Kim, Taejoo Cho, Gail-Joon Ahn, Jeong Hyun Yi:
Risk assessment of mobile applications based on machine learned malware dataset. Multim. Tools Appl. 77(4): 5027-5042 (2018) - [j58]Xinxin Zhao, Lingjun Li, Guoliang Xue, Gail-Joon Ahn:
Efficient Anonymous Message Submission. IEEE Trans. Dependable Secur. Comput. 15(2): 217-230 (2018) - [j57]Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [c150]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - [c149]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c148]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c147]Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
CacheLight: Defeating the CacheKit Attack. ASHES@CCS 2018: 65-74 - [c146]Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. CCS 2018: 664-676 - [c145]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS. CHASE 2018: 94-99 - [c144]Vaibhav Hemant Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
Challenges and Preparedness of SDN-based Firewalls. SDN-NFV@CODASPY 2018: 33-38 - [c143]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - [c142]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - [c141]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Challenges, Opportunities and a Framework for Web Environment Forensics. IFIP Int. Conf. Digital Forensics 2018: 11-33 - [c140]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c139]Vu Coughlin, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems. SmartGridComm 2018: 1-6 - [e16]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e15]Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [e14]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [r2]Gail-Joon Ahn:
Discretionary Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j56]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward Standardization of Authenticated Caller ID Transmission. IEEE Commun. Stand. Mag. 1(3): 30-36 (2017) - [j55]Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
E-mail Header Injection Vulnerabilities. it Inf. Technol. 59(2): 67 (2017) - [c138]Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupé, Ziming Zhao, Marthony Taguinod, Gail-Joon Ahn:
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. AAMAS 2017: 178-186 - [c137]Carlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c136]Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. CNS 2017: 1-9 - [c135]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c134]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - [c133]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c132]Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukwha Kyung, Dijiang Huang, Gail-Joon Ahn:
Science DMZ: SDN based secured cloud testbed. NFV-SDN 2017: 1-2 - [c131]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - [c130]Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - [c129]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - [e13]Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita:
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017. ACM 2017, ISBN 978-1-4503-4523-1 [contents] - [e12]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j54]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
dbling: Identifying extensions installed on encrypted web thin clients. Digit. Investig. 18 Supplement: S55-S65 (2016) - [j53]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j52]Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [c128]Satya Gautam Vadlamudi, Sailik Sengupta, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Subbarao Kambhampati:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). AAMAS 2016: 1377-1378 - [c127]Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi:
Checking Intent-based Communication in Android with Intent Space Analysis. AsiaCCS 2016: 735-746 - [c126]Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyMix: Toward SDN-based Intelligent Honeynet. SDN-NFV@CODASPY 2016: 1-6 - [c125]Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - [c124]Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black:
Towards Automated Threat Intelligence Fusion. CIC 2016: 408-416 - [c123]Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13 - [c122]Dae-il Jang, Gail-Joon Ahn, Hyunuk Hwang, Kibom Kim:
Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper). IRI 2016: 609-614 - [c121]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation. Kaleidoscope 2016: 1-8 - [c120]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c119]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. IEEE Symposium on Security and Privacy 2016: 320-338 - [e11]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - [i4]Satya Gautam Vadlamudi, Sailik Sengupta, Subbarao Kambhampati, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. CoRR abs/1602.07024 (2016) - 2015
- [j51]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j50]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Trans. Collab. Comput. 1(6): e3 (2015) - [j49]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j48]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - [c118]Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann:
ACTRA: A Case Study for Threat Information Sharing. WISCS@CCS 2015: 23-26 - [c117]Khaled Riad, Yan Zhu, Hongxin Hu, Gail-Joon Ahn:
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. CIC 2015: 28-35 - [c116]Napoleon Paxton, Dae-il Jang, Stephen Russell, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden:
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. HICSS 2015: 5244-5252 - [c115]Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward a Moving Target Defense for Web Applications. IRI 2015: 510-517 - [c114]Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi, Younghee Park:
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. NFV-SDN 2015: 107-114 - [c113]Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - [e10]Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3 [contents] - 2014
- [j47]Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - [c112]Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c111]Gail-Joon Ahn, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - [c110]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c109]Napoleon Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-Joon Ahn, Stephen Russell:
Discovering and analyzing deviant communities: Methods and experiments. CollaborateCom 2014: 163-170 - [c108]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving security assurance with assertion-based application construction. CollaborateCom 2014: 503-510 - [c107]Wonkyu Han, Hongxin Hu, Gail-Joon Ahn:
LPM: Layered Policy Management for Software-Defined Networks. DBSec 2014: 356-363 - [c106]Clinton D'Souza, Gail-Joon Ahn, Marthony Taguinod:
Policy-driven security management for fog computing: Preliminary framework and a case study. IRI 2014: 16-23 - [c105]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c104]Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c103]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - [e9]Gail-Joon Ahn, Moti Yung, Ninghui Li:
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. ACM 2014, ISBN 978-1-4503-2957-6 [contents] - [e8]Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein, Gail-Joon Ahn:
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3153-1 [contents] - [e7]Gail-Joon Ahn, Alina Oprea, Reihaneh Safavi-Naini:
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3239-2 [contents] - [e6]Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo:
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3149-4 [contents] - [e5]Gail-Joon Ahn, Tomas Sander:
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, WISCS '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3151-7 [contents] - [e4]Gail-Joon Ahn, Anupam Datta:
Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3148-7 [contents] - 2013
- [j46]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [j45]Lawrence Teo, Gail-Joon Ahn:
Extensible policy framework for heterogeneous network environments. Int. J. Inf. Comput. Secur. 5(4): 251-274 (2013) - [j44]Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization-based policy analysis for SELinux: framework and user study. Int. J. Inf. Sec. 12(3): 155-171 (2013) - [j43]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Discovery and Resolution of Anomalies in Web Access Control Policies. IEEE Trans. Dependable Secur. Comput. 10(6): 341-354 (2013) - [j42]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013) - [j41]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Multiparty Access Control for Online Social Networks: Model and Mechanisms. IEEE Trans. Knowl. Data Eng. 25(7): 1614-1627 (2013) - [j40]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu:
Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Serv. Comput. 6(2): 227-238 (2013) - [c102]Ziming Zhao, Gail-Joon Ahn:
Using instruction sequence abstraction for shellcode detection and attribution. CNS 2013: 323-331 - [c101]Justin Paglierani, Mike Mabey, Gail-Joon Ahn:
Towards comprehensive and collaborative forensics on email evidence. CollaborateCom 2013: 11-20 - [c100]Carlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn:
Supporting secure collaborations with attribute-based access control. CollaborateCom 2013: 525-530 - [c99]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. COMPSAC 2013: 21-26 - [c98]Wonkyu Han, Mike Mabey, Gail-Joon Ahn:
Simulation-based validation for smart grid environments. IRI 2013: 14-21 - [c97]Wonkyu Han, Mike Mabey, Gail-Joon Ahn, Tae Sung Kim:
Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results. IRI (best papers) 2013: 27-44 - [c96]Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. SocialCom 2013: 423-428 - [c95]Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. USENIX Security Symposium 2013: 383-398 - 2012
- [j39]Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn, Hong-Jia Zhao:
Efficient construction of provably secure steganography under ordinary covert channels. Sci. China Inf. Sci. 55(7): 1639-1649 (2012) - [j38]Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou:
Access control for online social networks third party applications. Comput. Secur. 31(8): 897-911 (2012) - [j37]Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012) - [j36]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Towards HIPAA-Compliant Healthcare Systems in Cloud Computing. Int. J. Comput. Model. Algorithms Medicine 3(2): 1-22 (2012) - [j35]Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu, Gail-Joon Ahn:
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Inf. Softw. Technol. 54(12): 1396-1417 (2012) - [j34]Gail-Joon Ahn, Jing Jin, Mohamed Shehab:
Policy-driven role-based access management for ad-hoc collaboration. J. Comput. Secur. 20(2-3): 223-257 (2012) - [j33]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5): 1083-1095 (2012) - [j32]William R. Claycomb, Dongwan Shin, Gail-Joon Ahn:
Enhancing directory virtualization to detect insider activity. Secur. Commun. Networks 5(8): 873-886 (2012) - [j31]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. IEEE Trans. Dependable Secur. Comput. 9(2): 250-260 (2012) - [j30]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Detecting and Resolving Firewall Policy Anomalies. IEEE Trans. Dependable Secur. Comput. 9(3): 318-331 (2012) - [j29]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [j28]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu:
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Trans. Parallel Distributed Syst. 23(12): 2231-2244 (2012) - [c94]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao:
Comparison-based encryption for fine-grained access control in clouds. CODASPY 2012: 105-116 - [c93]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Secure sharing of electronic health records in clouds. CollaborateCom 2012: 711-718 - [c92]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi:
SocialImpact: Systematic Analysis of Underground Social Dynamics. ESORICS 2012: 877-894 - [c91]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Enabling Collaborative data sharing in Google+. GLOBECOM 2012: 720-725 - [c90]Yan Zhu, Shan-Biao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. GLOBECOM 2012: 949-954 - [c89]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Towards HIPAA-compliant healthcare systems. IHI 2012: 593-602 - [c88]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang:
Towards temporal access control in cloud computing. INFOCOM 2012: 2576-2580 - [c87]Yiming Jing, Gail-Joon Ahn, Hongxin Hu:
Model-Based Conformance Testing for Android. IWSEC 2012: 1-18 - 2011
- [j27]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu:
Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8): 1608-1617 (2011) - [j26]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3): 116-127 (2011) - [j25]Jing Jin, Gail-Joon Ahn:
Assured resource sharing in Grid environments. Int. J. Inf. Comput. Secur. 4(3): 215-233 (2011) - [j24]Gail-Joon Ahn, Mohamed Shehab, Anna Cinzia Squicciarini:
Security and Privacy in Social Networks. IEEE Internet Comput. 15(3): 10-12 (2011) - [j23]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Shan-Biao Wang:
Provably Secure Role-Based Encryption with Revocation Mechanism. J. Comput. Sci. Technol. 26(4): 697-710 (2011) - [c86]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. ACSAC 2011: 103-112 - [c85]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen:
Poster: temporal attribute-based encryption in clouds. CCS 2011: 881-884 - [c84]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, Shimin Chen:
Collaborative integrity verification in hybrid clouds. CollaborateCom 2011: 191-200 - [c83]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Ontology-based policy anomaly management for autonomic computing. CollaborateCom 2011: 487-494 - [c82]Napoleon Paxton, Gail-Joon Ahn, Mohamed Shehab:
MasterBlaster: Identifying Influential Players in Botnet Transactions. COMPSAC 2011: 413-419 - [c81]Hongxin Hu, Gail-Joon Ahn:
Multiparty Authorization Framework for Data Sharing in Online Social Networks. DBSec 2011: 29-43 - [c80]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Examining Social Dynamics for Countering Botnet Attacks. GLOBECOM 2011: 1-5 - [c79]Gail-Joon Ahn, Pradeep Sekar:
Ontology-Based Risk Evaluation in User-Centric Identity Management. ICC 2011: 1-5 - [c78]Gail-Joon Ahn:
Securing and utilizing social dynamics. IRI 2011 - [c77]Mike Mabey, Gail-Joon Ahn:
Towards collaborative forensics: Preliminary framework. IRI 2011: 94-99 - [c76]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Dynamic audit services for integrity verification of outsourced storages in clouds. SAC 2011: 1550-1557 - [c75]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Anomaly discovery and resolution in web access control policies. SACMAT 2011: 165-174 - [c74]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Automatic Extraction of Secrets from Malware. WCRE 2011: 159-168 - 2010
- [j22]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 8(6): 24-31 (2010) - [j21]Hongxin Hu, Gail-Joon Ahn:
Constructing Authorization Systems Using Assurance Management Framework. IEEE Trans. Syst. Man Cybern. Part C 40(4): 396-405 (2010) - [c73]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. AsiaCCS 2010: 314-319 - [c72]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. CCS 2010: 756-758 - [c71]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, Mukesh Singhal:
Information flow control in cloud computing. CollaborateCom 2010: 1-7 - [c70]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A collaborative framework for privacy protection in online social networks. CollaborateCom 2010: 1-10 - [c69]Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng:
Representing and Reasoning about Web Access Control Policies. COMPSAC 2010: 137-146 - [c68]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. COMPSAC Workshops 2010: 393-398 - [c67]Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ESORICS 2010: 182-198 - [c66]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Response for Mitigating MANET Routing Attacks. GLOBECOM 2010: 1-6 - [c65]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
FAME: a firewall anomaly management environment. SafeConfig 2010: 17-26 - [e3]Tony Sager, Gail-Joon Ahn, Krishna Kant, Heather Richter Lipford:
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0093-3 [contents] - [i3]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy. IACR Cryptol. ePrint Arch. 2010: 188 (2010) - [i2]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. IACR Cryptol. ePrint Arch. 2010: 234 (2010) - [i1]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A Collaborative Framework for Privacy Protection in Online Social Networks. IACR Cryptol. ePrint Arch. 2010: 491 (2010)
2000 – 2009
- 2009
- [j20]Gail-Joon Ahn, Hongxin Hu, Jing Jin:
Security-Enhanced OSGi Service Environments. IEEE Trans. Syst. Man Cybern. Part C 39(5): 562-571 (2009) - [c64]Dongwan Shin, Rodrigo Lopes, William R. Claycomb, Gail-Joon Ahn:
A Framework for Enabling User-Controlled Persona in Online Social Networks. COMPSAC (1) 2009: 292-297 - [c63]Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn:
Towards System Integrity Protection with Graph-Based Policy Analysis. DBSec 2009: 65-80 - [c62]Jing Jin, Gail-Joon Ahn:
Authorization Framework for Resource Sharing in Grid Environments. FGIT-GDC 2009: 148-155 - [c61]Gail-Joon Ahn, Moonam Ko, Mohamed Shehab:
Privacy-Enhanced User-Centric Identity Management. ICC 2009: 1-5 - [c60]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for sharing electronic health records. SACMAT 2009: 125-134 - [r1]Gail-Joon Ahn:
Discretionary Access Control. Encyclopedia of Database Systems 2009: 864-866 - 2008
- [j19]Seng-Phil Hong, Gail-Joon Ahn, Wenjuan Xu:
Access Control Management for SCADA Systems. IEICE Trans. Inf. Syst. 91-D(10): 2449-2457 (2008) - [j18]Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla:
Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008) - [c59]Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn:
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ACSAC 2008: 257-266 - [c58]Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xinwen Zhang:
Access Control Model for Sharing Composite Electronic Health Records. CollaborateCom 2008: 340-354 - [c57]Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa:
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. ER 2008: 183-198 - [c56]Gail-Joon Ahn, Hongxin Hu, Jing Jin:
Towards Role-Based Authorization for OSGi Service Environments. FTDCS 2008: 23-29 - [c55]Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks. ICICS 2008: 174-189 - [c54]Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang:
Systematic Policy Analysis for High-Assurance Services in SELinux. POLICY 2008: 3-10 - [c53]Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization based policy analysis: case study in SELinux. SACMAT 2008: 165-174 - [c52]Hongxin Hu, Gail-Joon Ahn:
Enabling verification and conformance testing for access control model. SACMAT 2008: 195-204 - [c51]Gail-Joon Ahn, Moonam Ko, Mohamed Shehab:
Portable User-Centric Identity Management. SEC 2008: 573-587 - 2007
- [j17]Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong:
Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl. 30(1): 42-59 (2007) - [j16]Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn:
Certification process artifacts defined as measurable units for software assurance. Softw. Process. Improv. Pract. 12(2): 165-189 (2007) - [j15]Gail-Joon Ahn:
Guest editorial: Special issue on access control models and technologies. ACM Trans. Inf. Syst. Secur. 10(1): 1 (2007) - [c50]Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young:
Collegiate Cyber Game Design Criteria and Participation. ACIS-ICIS 2007: 1036-1041 - [c49]Lawrence Teo, Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework. AsiaCCS 2007: 362-364 - [c48]Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu:
Towards trust-aware access management for ad-hoc collaborations. CollaborateCom 2007: 41-48 - [c47]Gail-Joon Ahn, Moonam Ko:
User-centric privacy management for federated identity management. CollaborateCom 2007: 187-195 - [c46]Napoleon Paxton, Gail-Joon Ahn, Bill Chu:
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. IRI 2007: 73-78 - [c45]Gail-Joon Ahn, Dhruv Gami:
Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. ISCC 2007: 865-870 - [c44]Lawrence Teo, Gail-Joon Ahn:
Towards Effective Security Policy Management for Heterogeneous Network Environments. POLICY 2007: 241-245 - [c43]Gail-Joon Ahn, Hongxin Hu:
Towards realizing a formal RBAC model in real systems. SACMAT 2007: 215-224 - [e2]Steve Barker, Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings. Lecture Notes in Computer Science 4602, Springer 2007, ISBN 978-3-540-73533-5 [contents] - 2006
- [j14]Seok Won Lee, Divya Muthurajan, Robin A. Gandhi, Deepak S. Yavagal, Gail-Joon Ahn:
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance. Int. J. Softw. Eng. Knowl. Eng. 16(6): 851-884 (2006) - [c42]Jing Jin, Gail-Joon Ahn:
Towards Secure Information Sharing and Management in Grid Environments. CollaborateCom 2006 - [c41]Jing Jin, Gail-Joon Ahn, Mukesh Singhal:
ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. EDBT Workshops 2006: 724-740 - [c40]Seok Won Lee, Robin A. Gandhi, Divya Muthurajan, Deepak S. Yavagal, Gail-Joon Ahn:
Building problem domain ontology from security requirements in regulatory documents. SESS@ICSE 2006: 43-50 - [c39]Jing Jin, Gail-Joon Ahn:
Role-based access management for ad-hoc collaborative sharing. SACMAT 2006: 200-209 - 2005
- [j13]Dongwan Shin, Gail-Joon Ahn:
Role-based privilege and trust management. Comput. Syst. Sci. Eng. 20(6) (2005) - [j12]William J. Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong:
Access control in collaborative systems. ACM Comput. Surv. 37(1): 29-41 (2005) - [j11]Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j10]Karsten Sohr, Gail-Joon Ahn, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c38]Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi:
Common criteria requirements modeling and its uses for quality of information assurance (QoIA). ACM Southeast Regional Conference (2) 2005: 130-135 - [c37]Lawrence Teo, Gail-Joon Ahn:
Supporting access control policies across multiple operating systems. ACM Southeast Regional Conference (2) 2005: 288-293 - [c36]Gail-Joon Ahn, John Lam:
Managing privacy preferences for federated identity management. Digital Identity Management 2005: 28-36 - [c35]Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL. ESORICS 2005: 64-79 - [c34]Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. SESS@ICSE 2005: 1-7 - [c33]Karsten Sohr, Gail-Joon Ahn, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. SESS@ICSE 2005: 1-7 - [c32]Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal:
Active Automation of the DITSCAP. ISI 2005: 479-485 - [c31]Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn:
Formal specification of role-based security policies for clinical information systems. SAC 2005: 332-339 - [c30]Joshua Foster, Kalpathi R. Subramanian, Gail-Joon Ahn:
Interactive exploration of large filesystems. Visualization and Data Analysis 2005: 307-315 - [e1]Elena Ferrari, Gail-Joon Ahn:
10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings. ACM 2005, ISBN 1-59593-045-0 [contents] - 2004
- [j9]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
A role-based infrastructure management system: design and implementation. Concurr. Pract. Exp. 16(11): 1121-1141 (2004) - [c29]Dongwan Shin, Gail-Joon Ahn:
Role-based Trust Assignment in Trust Management Systems. PDCS 2004: 551-558 - [c28]Joshua Foster, Kalpathi R. Subramanian, Robert Herring, Gail-Joon Ahn:
Interactive Exploration of the AFS File System. INFOVIS 2004 - [c27]Dongwan Shin, Gail-Joon Ahn, Prasad Shenoy:
Ensuring information assurance in federated identity management. IPCCC 2004: 821-826 - [c26]Gail-Joon Ahn, Badrinath Mohan:
Secure Information Sharing Using Role-based Delegation. ITCC (2) 2004: 810-819 - [c25]Lawrence Teo, Yu-An Sun, Gail-Joon Ahn:
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. IWIA 2004: 155-168 - [c24]Gail-Joon Ahn, Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux. WOSIS 2004: 13-22 - [c23]Gail-Joon Ahn, Dongwan Shin, Longhua Zhang:
Role-Based Privilege Management Using Attribute Certificates and Delegation. TrustBus 2004: 100-109 - [c22]Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues. WISE 2004: 78-89 - 2003
- [j8]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003) - [c21]Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88 - [c20]Gail-Joon Ahn, Badrinath Mohan:
Role-Based Authorization in Decentralized Health Care Environments. SAC 2003: 251-256 - [c19]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation. SAC 2003: 325-330 - [c18]David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila:
The role control center: features and case studies. SACMAT 2003: 12-20 - [c17]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
On modeling system-centric information for role engineering. SACMAT 2003: 169-178 - [c16]Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng:
Dynamic and risk-aware network access management. SACMAT 2003: 217-230 - [c15]Longhua Zhang, Gail-Joon Ahn:
Constrained Role-based Delegation. SEC 2003: 289-300 - [c14]William J. Tolone, Robin A. Gandhi, Gail-Joon Ahn:
Locale-based access control: placing collaborative authorization decisions in context. SMC 2003: 4120-4127 - [c13]Gail-Joon Ahn, Longhua Zhang, Dongwan Shin, Bill Chu:
Authorization management for role-based collaboration. SMC 2003: 4128-4134 - [c12]Gail-Joon Ahn:
Specification and Classification of Role-based Authorization Policies. WETICE 2003: 202-207 - 2002
- [j7]Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin:
Reconstructing a formal security model. Inf. Softw. Technol. 44(11): 649-657 (2002) - [c11]Dongwan Shin, Gail-Joon Ahn, Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939 - [c10]Dongwan Shin, Gail-Joon Ahn, Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60 - [c9]William J. Tolone, Bei-tseng Chu, Gail-Joon Ahn, Robert G. Wilhelm, John E. Sims:
Challenges to Multi-Enterprise Integration. ICEIMT 2002: 205-216 - [c8]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A role-based delegation framework for healthcare information systems. SACMAT 2002: 125-134 - [c7]Gail-Joon Ahn, Dongwan Shin:
Towards Scalable Authentication in Health Services. WETICE 2002: 83-88 - 2001
- [j6]Gail-Joon Ahn, Kwangjo Kim:
CONUGA: Constrained User-Group Assignment. J. Netw. Comput. Appl. 24(2): 87-100 (2001) - [j5]Gail-Joon Ahn, Ravi S. Sandhu:
Decentralized user group assignment in Windows NT. J. Syst. Softw. 56(1): 39-49 (2001) - [j4]Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn:
Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) - [c6]Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 - [c5]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role based delegation. SACMAT 2001: 153-162 - [c4]Gail-Joon Ahn, Michael E. Shin:
Role-Based Authorization Constraints Specification Using Object Constraint Language. WETICE 2001: 157-162 - 2000
- [j3]Gail-Joon Ahn:
Role-based access control in DCOM. J. Syst. Archit. 46(13): 1175-1184 (2000) - [j2]Gail-Joon Ahn, Ravi S. Sandhu:
Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) - [c3]Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10 - [c2]Michael E. Shin, Gail-Joon Ahn:
UML-Based Representation of Role-Based Access Control. WETICE 2000: 195-200
1990 – 1999
- 1999
- [j1]Gail-Joon Ahn, Ravi S. Sandhu:
Towards role-based administration in network information services. J. Netw. Comput. Appl. 22(3): 199-213 (1999) - [c1]Gail-Joon Ahn, Ravi S. Sandhu:
The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint