Year |
Citation |
Score |
2019 |
Ahn G, Gu G, Hu H, Shin S. Guest Editors’ Introduction: Special Section on Security in Emerging Networking Technologies Ieee Transactions On Dependable and Secure Computing. 16: 913-914. DOI: 10.1109/Tdsc.2019.2906921 |
0.321 |
|
2019 |
Hu H, Han W, Kyung S, Wang J, Ahn G, Zhao Z, Li H. Towards a reliable firewall for software-defined networks Computers & Security. 87: 101597. DOI: 10.1016/J.Cose.2019.101597 |
0.319 |
|
2018 |
Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn G. Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection Ieee Transactions On Information Forensics and Security. 13: 1286-1300. DOI: 10.1109/Tifs.2017.2787905 |
0.398 |
|
2018 |
Chen J, Wang C, He K, Zhao Z, Chen M, Du R, Ahn G. Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2871682 |
0.337 |
|
2018 |
Zhao X, Li L, Xue G, Ahn G. Efficient Anonymous Message Submission Ieee Transactions On Dependable and Secure Computing. 15: 217-230. DOI: 10.1109/Tdsc.2016.2556659 |
0.397 |
|
2018 |
Cho H, Yi JH, Ahn G. DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications Ieee Access. 6: 71229-71240. DOI: 10.1109/Access.2018.2881699 |
0.372 |
|
2018 |
Kim H, Cho T, Ahn G, Yi JH. Risk assessment of mobile applications based on machine learned malware dataset Multimedia Tools and Applications. 77: 5027-5042. DOI: 10.1007/S11042-017-4756-0 |
0.406 |
|
2016 |
Jing Y, Ahn G, Hu H, Cho H, Zhao Z. TRIPLEMON: A multi-layer security framework for mediating inter-process communication on Android Journal of Computer Security. 24: 405-426. DOI: 10.3233/Jcs-160552 |
0.458 |
|
2016 |
Mabey M, Doupé A, Zhao Z, Ahn G. dbling: Identifying extensions installed on encrypted web thin clients Digital Investigation. 18. DOI: 10.1016/J.Diin.2016.04.007 |
0.393 |
|
2015 |
Zhao Z, Ahn G, Hu H. Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation Acm Transactions On Information and System Security. 17: 14. DOI: 10.1145/2701423 |
0.398 |
|
2015 |
Jing Y, Ahn G, Zhao Z, Hu H. Towards Automated Risk Assessment and Mitigation of Mobile Applications Ieee Transactions On Dependable and Secure Computing. 12: 571-584. DOI: 10.1109/Tdsc.2014.2366457 |
0.345 |
|
2014 |
Ahn G, Enck W, Shin DD. Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms Ieee Transactions On Dependable and Secure Computing. 11: 209-210. DOI: 10.1109/Tdsc.2014.2312738 |
0.406 |
|
2014 |
Zhu Y, Ma D, Hu C, Ahn G, Hu H. Secure and efficient random functions with variable-length output Journal of Network and Computer Applications. 45: 121-133. DOI: 10.1016/J.Jnca.2014.07.033 |
0.36 |
|
2014 |
Han W, Mabey M, Ahn G, Kim TS. Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results Advances in Intelligent Systems and Computing. 263: 27-44. DOI: 10.1007/978-3-319-04717-1_2 |
0.35 |
|
2013 |
Teo L, Ahn GJ. Extensible policy framework for heterogeneous network environments International Journal of Information and Computer Security. 5: 251-274. DOI: 10.1504/Ijics.2013.058210 |
0.435 |
|
2013 |
Zhu Y, Ahn G, Hu H, Yau SS, An HG, Hu C. Dynamic Audit Services for Outsourced Storages in Clouds Ieee Transactions On Services Computing. 6: 227-238. DOI: 10.1109/Tsc.2011.51 |
0.396 |
|
2013 |
Hu H, Ahn G, Jorgensen J. Multiparty Access Control for Online Social Networks: Model and Mechanisms Ieee Transactions On Knowledge and Data Engineering. 25: 1614-1627. DOI: 10.1109/Tkde.2012.97 |
0.463 |
|
2013 |
Zhu Y, Ahn G, Hu H, Ma D, Wang S. Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy Ieee Transactions On Information Forensics and Security. 8: 2138-2153. DOI: 10.1109/Tifs.2013.2287858 |
0.446 |
|
2013 |
Hu H, Ahn GJ, Kulkarni K. Discovery and resolution of anomalies in web access control policies Ieee Transactions On Dependable and Secure Computing. 10: 341-354. DOI: 10.1109/Tdsc.2013.18 |
0.476 |
|
2013 |
Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46 |
0.673 |
|
2013 |
Xu W, Shehab M, Ahn GJ. Visualization-based policy analysis for SELinux: Framework and user study International Journal of Information Security. 12: 155-171. DOI: 10.1007/S10207-012-0180-7 |
0.366 |
|
2012 |
Wu R, Ahn G, Hu H. Towards HIPAA-Compliant Healthcare Systems in Cloud Computing International Journal of Computational Models and Algorithms in Medicine. 3: 1-22. DOI: 10.4018/Jcmam.2012040101 |
0.331 |
|
2012 |
Ahn GJ, Jin J, Shehab M. Policy-driven role-based access management for ad-hoc collaboration Journal of Computer Security. 20: 223-257. DOI: 10.3233/Jcs-2012-0446 |
0.474 |
|
2012 |
Zhu Y, Hu H, Ahn G, Yu M. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage Ieee Transactions On Parallel and Distributed Systems. 23: 2231-2244. DOI: 10.1109/Tpds.2012.66 |
0.426 |
|
2012 |
Hu H, Ahn G, Kulkarni K. Detecting and Resolving Firewall Policy Anomalies Ieee Transactions On Dependable and Secure Computing. 9: 318-331. DOI: 10.1109/Tdsc.2012.20 |
0.467 |
|
2012 |
Zhao Z, Hu H, Ahn G, Wu R. Risk-Aware Mitigation for MANET Routing Attacks Ieee Transactions On Dependable and Secure Computing. 9: 250-260. DOI: 10.1109/Tdsc.2011.51 |
0.332 |
|
2012 |
Zhu Y, Hu H, Ahn G, Yau SS. Efficient audit service outsourcing for data integrity in clouds Journal of Systems and Software. 85: 1083-1095. DOI: 10.1016/J.Jss.2011.12.024 |
0.439 |
|
2012 |
Sohr K, Kuhlmann M, Gogolla M, Hu H, Ahn G. Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL Information & Software Technology. 54: 1396-1417. DOI: 10.1016/J.Infsof.2012.06.008 |
0.432 |
|
2012 |
Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008 |
0.436 |
|
2012 |
Zhu Y, Yu MY, Hu HX, Ahn G, Zhao HJ. Efficient construction of provably secure steganography under ordinary covert channels Science in China Series F: Information Sciences. 55: 1639-1649. DOI: 10.1007/S11432-012-4598-3 |
0.368 |
|
2012 |
Claycomb W, Shin D, Ahn G. Enhancing directory virtualization to detect insider activity Security and Communication Networks. 5: 873-886. DOI: 10.1002/Sec.362 |
0.457 |
|
2011 |
Jin J, Ahn GJ. Assured resource sharing in Grid environments International Journal of Information and Computer Security. 4: 215-233. DOI: 10.1504/Ijics.2011.040181 |
0.47 |
|
2011 |
Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66 |
0.385 |
|
2011 |
Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X. Patient-centric authorization framework for electronic healthcare services Computers and Security. 30: 116-127. DOI: 10.1016/J.Cose.2010.09.001 |
0.549 |
|
2011 |
Zhu Y, Wang H, Hu Z, Ahn G, Hu H. Zero-knowledge proofs of retrievability Science in China Series F: Information Sciences. 54: 1608-1617. DOI: 10.1007/S11432-011-4293-9 |
0.377 |
|
2011 |
Zhu Y, Hu HX, Ahn G, Wang HX, Wang SB. Provably Secure Role-Based Encryption with Revocation Mechanism Journal of Computer Science and Technology. 26: 697-710. DOI: 10.1007/S11390-011-1169-9 |
0.444 |
|
2011 |
Hu H, Ahn GJ. Multiparty authorization framework for data sharing in online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 29-43. DOI: 10.1007/978-3-642-22348-8_5 |
0.351 |
|
2010 |
Hu H, Ahn GJ. Constructing authorization systems using assurance management framework Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 396-405. DOI: 10.1109/TSMCC.2010.2047856 |
0.306 |
|
2009 |
Jin J, Ahn GJ. Authorization framework for resource sharing in grid environments Communications in Computer and Information Science. 63: 148-155. DOI: 10.1007/978-3-642-10549-4_18 |
0.359 |
|
2008 |
Hong S, Ahn G, Xu W. Access Control Management for SCADA Systems Ieice Transactions On Information and Systems. 91: 2449-2457. DOI: 10.1093/Ietisy/E91-D.10.2449 |
0.404 |
|
2007 |
Ahn GJ, Hu H. Towards realizing a formal RBAC model in real systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 215-224. DOI: 10.1145/1266840.1266875 |
0.32 |
|
2007 |
Teo L, Ahn GJ. Managing heterogeneous network environments using an extensible policy framework Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 362-364. DOI: 10.1145/1229285.1229328 |
0.339 |
|
2007 |
Ahn GJ. Guest editorial: Special issue on access control models and technologies Acm Transactions On Information and System Security. 10. DOI: 10.1145/1210263.1216576 |
0.305 |
|
2007 |
Teo L, Ahn GJ. Towards effective security policy management for heterogeneous network environments Proceedings - Eighth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2007. 241-245. DOI: 10.1109/POLICY.2007.44 |
0.308 |
|
2007 |
Ahn GJ, Garni D. Enabling role-based delegation and revocation on security-enhanced Linux Proceedings - Ieee Symposium On Computers and Communications. 865-870. DOI: 10.1109/ISCC.2007.4381574 |
0.389 |
|
2007 |
Ahn G, Mohan B, Hong S. Towards secure information sharing using role-based delegation Journal of Network and Computer Applications. 30: 42-59. DOI: 10.1016/J.Jnca.2005.08.004 |
0.45 |
|
2006 |
Jin G, Ahn GJ. Towards secure information sharing and management in grid environments 2006 International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom. DOI: 10.1109/COLCOM.2006.361892 |
0.366 |
|
2006 |
Jin J, Ahn GJ. Role-based access management for ad-hoc collaborative sharing Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 200-209. |
0.369 |
|
2005 |
Sohr K, Ahn G, Migge L. Articulating and enforcing authorisation policies with UML and OCL Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083215 |
0.443 |
|
2005 |
Lee SW, Gandhi RA, Ahn G. Establishing trustworthiness in services of the critical infrastructure through certification and accreditation Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083205 |
0.426 |
|
2005 |
Tolone W, Ahn GJ, Pai T, Hong SP. Access control in collaborative systems Acm Computing Surveys. 37: 29-41. DOI: 10.1145/1057977.1057979 |
0.414 |
|
2005 |
Shin D, Ahn GJ. Role-based privilege and trust management Computer Systems Science and Engineering. 20: 401-410. |
0.366 |
|
2004 |
Ahn GJ, Mohan B. Secure information sharing using role-based delegation International Conference On Information Technology: Coding Computing, Itcc. 2: 810-815. |
0.338 |
|
2003 |
Zhang L, Ahn G, Chu B. A rule-based framework for role-based delegation and revocation Acm Transactions On Information and System Security. 6: 404-441. DOI: 10.1145/937527.937530 |
0.496 |
|
2003 |
Ahn G, Kim K, Jang J. MF (minority first) scheme for defeating distributed denial of service attacks Proceedings - Ieee Symposium On Computers and Communications. 1233-1238. DOI: 10.1109/ISCC.2003.1214283 |
0.315 |
|
2003 |
Ahn GJ, Mohan B. Role-based authorization in decentralized health care environments Proceedings of the Acm Symposium On Applied Computing. 251-256. |
0.307 |
|
2002 |
Ahn GJ, Shin D. Towards scalable authentication in health services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 83-88. DOI: 10.1109/ENABL.2002.1029993 |
0.368 |
|
2002 |
Shin D, Ahn GJ, Park JS. An application of directory service markup language (DSML) for role-based access control (RBAC) Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 934-939. DOI: 10.1109/CMPSAC.2002.1045125 |
0.348 |
|
2001 |
Park JS, Sandhu R, Ahn G. Role-based access control on the web Acm Transactions On Information and System Security. 4: 37-71. DOI: 10.1145/383775.383777 |
0.577 |
|
2001 |
Ahn GJ, Sandhu R. Decentralized user group assignment in Windows NT Journal of Systems and Software. 56: 39-49. DOI: 10.1016/S0164-1212(00)00084-4 |
0.513 |
|
2001 |
Ahn GJ, Kim K. CONUGA: Constrained user-group assignment Journal of Network and Computer Applications. 24: 87-100. DOI: 10.1006/Jnca.2000.0125 |
0.365 |
|
2000 |
Ahn G, Sandhu R. Role-based authorization constraints specification Acm Transactions On Information and System Security. 3: 207-226. DOI: 10.1145/382912.382913 |
0.501 |
|
2000 |
Ahn GJ. Role-based access control in DCOM Journal of Systems Architecture. 46: 1175-1184. DOI: 10.1016/S1383-7621(00)00017-5 |
0.465 |
|
1999 |
Ahn GJ, Sandhu R. Towards role-based administration in network information services Journal of Network and Computer Applications. 22: 199-213. DOI: 10.1006/Jnca.1999.0091 |
0.475 |
|
Show low-probability matches. |