Gail-Joon Ahn, Ph.D. - Publications

Affiliations: 
2000 George Mason University, Washington, DC 
Area:
Computer Science, Information Science

64 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Ahn G, Gu G, Hu H, Shin S. Guest Editors’ Introduction: Special Section on Security in Emerging Networking Technologies Ieee Transactions On Dependable and Secure Computing. 16: 913-914. DOI: 10.1109/Tdsc.2019.2906921  0.321
2019 Hu H, Han W, Kyung S, Wang J, Ahn G, Zhao Z, Li H. Towards a reliable firewall for software-defined networks Computers & Security. 87: 101597. DOI: 10.1016/J.Cose.2019.101597  0.319
2018 Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn G. Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection Ieee Transactions On Information Forensics and Security. 13: 1286-1300. DOI: 10.1109/Tifs.2017.2787905  0.398
2018 Chen J, Wang C, He K, Zhao Z, Chen M, Du R, Ahn G. Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2871682  0.337
2018 Zhao X, Li L, Xue G, Ahn G. Efficient Anonymous Message Submission Ieee Transactions On Dependable and Secure Computing. 15: 217-230. DOI: 10.1109/Tdsc.2016.2556659  0.397
2018 Cho H, Yi JH, Ahn G. DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications Ieee Access. 6: 71229-71240. DOI: 10.1109/Access.2018.2881699  0.372
2018 Kim H, Cho T, Ahn G, Yi JH. Risk assessment of mobile applications based on machine learned malware dataset Multimedia Tools and Applications. 77: 5027-5042. DOI: 10.1007/S11042-017-4756-0  0.406
2016 Jing Y, Ahn G, Hu H, Cho H, Zhao Z. TRIPLEMON: A multi-layer security framework for mediating inter-process communication on Android Journal of Computer Security. 24: 405-426. DOI: 10.3233/Jcs-160552  0.458
2016 Mabey M, Doupé A, Zhao Z, Ahn G. dbling: Identifying extensions installed on encrypted web thin clients Digital Investigation. 18. DOI: 10.1016/J.Diin.2016.04.007  0.393
2015 Zhao Z, Ahn G, Hu H. Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation Acm Transactions On Information and System Security. 17: 14. DOI: 10.1145/2701423  0.398
2015 Jing Y, Ahn G, Zhao Z, Hu H. Towards Automated Risk Assessment and Mitigation of Mobile Applications Ieee Transactions On Dependable and Secure Computing. 12: 571-584. DOI: 10.1109/Tdsc.2014.2366457  0.345
2014 Ahn G, Enck W, Shin DD. Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms Ieee Transactions On Dependable and Secure Computing. 11: 209-210. DOI: 10.1109/Tdsc.2014.2312738  0.406
2014 Zhu Y, Ma D, Hu C, Ahn G, Hu H. Secure and efficient random functions with variable-length output Journal of Network and Computer Applications. 45: 121-133. DOI: 10.1016/J.Jnca.2014.07.033  0.36
2014 Han W, Mabey M, Ahn G, Kim TS. Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results Advances in Intelligent Systems and Computing. 263: 27-44. DOI: 10.1007/978-3-319-04717-1_2  0.35
2013 Teo L, Ahn GJ. Extensible policy framework for heterogeneous network environments International Journal of Information and Computer Security. 5: 251-274. DOI: 10.1504/Ijics.2013.058210  0.435
2013 Zhu Y, Ahn G, Hu H, Yau SS, An HG, Hu C. Dynamic Audit Services for Outsourced Storages in Clouds Ieee Transactions On Services Computing. 6: 227-238. DOI: 10.1109/Tsc.2011.51  0.396
2013 Hu H, Ahn G, Jorgensen J. Multiparty Access Control for Online Social Networks: Model and Mechanisms Ieee Transactions On Knowledge and Data Engineering. 25: 1614-1627. DOI: 10.1109/Tkde.2012.97  0.463
2013 Zhu Y, Ahn G, Hu H, Ma D, Wang S. Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy Ieee Transactions On Information Forensics and Security. 8: 2138-2153. DOI: 10.1109/Tifs.2013.2287858  0.446
2013 Hu H, Ahn GJ, Kulkarni K. Discovery and resolution of anomalies in web access control policies Ieee Transactions On Dependable and Secure Computing. 10: 341-354. DOI: 10.1109/Tdsc.2013.18  0.476
2013 Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46  0.673
2013 Xu W, Shehab M, Ahn GJ. Visualization-based policy analysis for SELinux: Framework and user study International Journal of Information Security. 12: 155-171. DOI: 10.1007/S10207-012-0180-7  0.366
2012 Wu R, Ahn G, Hu H. Towards HIPAA-Compliant Healthcare Systems in Cloud Computing International Journal of Computational Models and Algorithms in Medicine. 3: 1-22. DOI: 10.4018/Jcmam.2012040101  0.331
2012 Ahn GJ, Jin J, Shehab M. Policy-driven role-based access management for ad-hoc collaboration Journal of Computer Security. 20: 223-257. DOI: 10.3233/Jcs-2012-0446  0.474
2012 Zhu Y, Hu H, Ahn G, Yu M. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage Ieee Transactions On Parallel and Distributed Systems. 23: 2231-2244. DOI: 10.1109/Tpds.2012.66  0.426
2012 Hu H, Ahn G, Kulkarni K. Detecting and Resolving Firewall Policy Anomalies Ieee Transactions On Dependable and Secure Computing. 9: 318-331. DOI: 10.1109/Tdsc.2012.20  0.467
2012 Zhao Z, Hu H, Ahn G, Wu R. Risk-Aware Mitigation for MANET Routing Attacks Ieee Transactions On Dependable and Secure Computing. 9: 250-260. DOI: 10.1109/Tdsc.2011.51  0.332
2012 Zhu Y, Hu H, Ahn G, Yau SS. Efficient audit service outsourcing for data integrity in clouds Journal of Systems and Software. 85: 1083-1095. DOI: 10.1016/J.Jss.2011.12.024  0.439
2012 Sohr K, Kuhlmann M, Gogolla M, Hu H, Ahn G. Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL Information & Software Technology. 54: 1396-1417. DOI: 10.1016/J.Infsof.2012.06.008  0.432
2012 Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008  0.436
2012 Zhu Y, Yu MY, Hu HX, Ahn G, Zhao HJ. Efficient construction of provably secure steganography under ordinary covert channels Science in China Series F: Information Sciences. 55: 1639-1649. DOI: 10.1007/S11432-012-4598-3  0.368
2012 Claycomb W, Shin D, Ahn G. Enhancing directory virtualization to detect insider activity Security and Communication Networks. 5: 873-886. DOI: 10.1002/Sec.362  0.457
2011 Jin J, Ahn GJ. Assured resource sharing in Grid environments International Journal of Information and Computer Security. 4: 215-233. DOI: 10.1504/Ijics.2011.040181  0.47
2011 Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66  0.385
2011 Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X. Patient-centric authorization framework for electronic healthcare services Computers and Security. 30: 116-127. DOI: 10.1016/J.Cose.2010.09.001  0.549
2011 Zhu Y, Wang H, Hu Z, Ahn G, Hu H. Zero-knowledge proofs of retrievability Science in China Series F: Information Sciences. 54: 1608-1617. DOI: 10.1007/S11432-011-4293-9  0.377
2011 Zhu Y, Hu HX, Ahn G, Wang HX, Wang SB. Provably Secure Role-Based Encryption with Revocation Mechanism Journal of Computer Science and Technology. 26: 697-710. DOI: 10.1007/S11390-011-1169-9  0.444
2011 Hu H, Ahn GJ. Multiparty authorization framework for data sharing in online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 29-43. DOI: 10.1007/978-3-642-22348-8_5  0.351
2010 Hu H, Ahn GJ. Constructing authorization systems using assurance management framework Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 396-405. DOI: 10.1109/TSMCC.2010.2047856  0.306
2009 Jin J, Ahn GJ. Authorization framework for resource sharing in grid environments Communications in Computer and Information Science. 63: 148-155. DOI: 10.1007/978-3-642-10549-4_18  0.359
2008 Hong S, Ahn G, Xu W. Access Control Management for SCADA Systems Ieice Transactions On Information and Systems. 91: 2449-2457. DOI: 10.1093/Ietisy/E91-D.10.2449  0.404
2007 Ahn GJ, Hu H. Towards realizing a formal RBAC model in real systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 215-224. DOI: 10.1145/1266840.1266875  0.32
2007 Teo L, Ahn GJ. Managing heterogeneous network environments using an extensible policy framework Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 362-364. DOI: 10.1145/1229285.1229328  0.339
2007 Ahn GJ. Guest editorial: Special issue on access control models and technologies Acm Transactions On Information and System Security. 10. DOI: 10.1145/1210263.1216576  0.305
2007 Teo L, Ahn GJ. Towards effective security policy management for heterogeneous network environments Proceedings - Eighth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2007. 241-245. DOI: 10.1109/POLICY.2007.44  0.308
2007 Ahn GJ, Garni D. Enabling role-based delegation and revocation on security-enhanced Linux Proceedings - Ieee Symposium On Computers and Communications. 865-870. DOI: 10.1109/ISCC.2007.4381574  0.389
2007 Ahn G, Mohan B, Hong S. Towards secure information sharing using role-based delegation Journal of Network and Computer Applications. 30: 42-59. DOI: 10.1016/J.Jnca.2005.08.004  0.45
2006 Jin G, Ahn GJ. Towards secure information sharing and management in grid environments 2006 International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom. DOI: 10.1109/COLCOM.2006.361892  0.366
2006 Jin J, Ahn GJ. Role-based access management for ad-hoc collaborative sharing Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 200-209.  0.369
2005 Sohr K, Ahn G, Migge L. Articulating and enforcing authorisation policies with UML and OCL Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083215  0.443
2005 Lee SW, Gandhi RA, Ahn G. Establishing trustworthiness in services of the critical infrastructure through certification and accreditation Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083205  0.426
2005 Tolone W, Ahn GJ, Pai T, Hong SP. Access control in collaborative systems Acm Computing Surveys. 37: 29-41. DOI: 10.1145/1057977.1057979  0.414
2005 Shin D, Ahn GJ. Role-based privilege and trust management Computer Systems Science and Engineering. 20: 401-410.  0.366
2004 Ahn GJ, Mohan B. Secure information sharing using role-based delegation International Conference On Information Technology: Coding Computing, Itcc. 2: 810-815.  0.338
2003 Zhang L, Ahn G, Chu B. A rule-based framework for role-based delegation and revocation Acm Transactions On Information and System Security. 6: 404-441. DOI: 10.1145/937527.937530  0.496
2003 Ahn G, Kim K, Jang J. MF (minority first) scheme for defeating distributed denial of service attacks Proceedings - Ieee Symposium On Computers and Communications. 1233-1238. DOI: 10.1109/ISCC.2003.1214283  0.315
2003 Ahn GJ, Mohan B. Role-based authorization in decentralized health care environments Proceedings of the Acm Symposium On Applied Computing. 251-256.  0.307
2002 Ahn GJ, Shin D. Towards scalable authentication in health services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 83-88. DOI: 10.1109/ENABL.2002.1029993  0.368
2002 Shin D, Ahn GJ, Park JS. An application of directory service markup language (DSML) for role-based access control (RBAC) Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 934-939. DOI: 10.1109/CMPSAC.2002.1045125  0.348
2001 Park JS, Sandhu R, Ahn G. Role-based access control on the web Acm Transactions On Information and System Security. 4: 37-71. DOI: 10.1145/383775.383777  0.577
2001 Ahn GJ, Sandhu R. Decentralized user group assignment in Windows NT Journal of Systems and Software. 56: 39-49. DOI: 10.1016/S0164-1212(00)00084-4  0.513
2001 Ahn GJ, Kim K. CONUGA: Constrained user-group assignment Journal of Network and Computer Applications. 24: 87-100. DOI: 10.1006/Jnca.2000.0125  0.365
2000 Ahn G, Sandhu R. Role-based authorization constraints specification Acm Transactions On Information and System Security. 3: 207-226. DOI: 10.1145/382912.382913  0.501
2000 Ahn GJ. Role-based access control in DCOM Journal of Systems Architecture. 46: 1175-1184. DOI: 10.1016/S1383-7621(00)00017-5  0.465
1999 Ahn GJ, Sandhu R. Towards role-based administration in network information services Journal of Network and Computer Applications. 22: 199-213. DOI: 10.1006/Jnca.1999.0091  0.475
Show low-probability matches.