Follow
Gail-Joon Ahn
Gail-Joon Ahn
Verified email at asu.edu
Title
Cited by
Cited by
Year
Security and privacy challenges in cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
IEEE Security & Privacy 8 (6), 24-31, 2010
19502010
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012
6862012
Role-based authorization constraints specification
GJ Ahn, R Sandhu
ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000
6562000
Deep android malware detection
N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ...
Proceedings of the seventh ACM on conference on data and application …, 2017
5402017
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong
ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005
5062005
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, BT Chu
ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003
4752003
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE transactions on services computing 6 (2), 227-238, 2011
4162011
Role-based access control on the web
JS Park, R Sandhu, GJ Ahn
ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001
4052001
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011
3822011
FLOWGUARD: Building robust firewalls for software-defined networks
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of the third workshop on Hot topics in software defined …, 2014
3662014
User agent to exercise privacy control management in a user-centric identity management system
GJ Ahn
US Patent 9,338,188, 2016
2942016
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
IEEE transactions on knowledge and data engineering 25 (7), 1614-1627, 2012
2882012
Policy-driven security management for fog computing: Preliminary framework and a case study
C Dsouza, GJ Ahn, M Taguinod
Proceedings of the 2014 IEEE 15th international conference on information …, 2014
2852014
Detecting and resolving firewall policy anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012
2322012
User agent to exercise privacy control management in a user-centric identity management system
GJ Ahn
US Patent 8,799,984, 2014
2192014
Securecloud: Towards a comprehensive security framework for cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
2102010
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
2016 APWG symposium on electronic crime research (eCrime), 1-13, 2016
2032016
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2022010
A role-based delegation framework for healthcare information systems
L Zhang, GJ Ahn, BT Chu
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1952002
The RSL99 language for role-based separation of duty constraints
GJ Ahn, R Sandhu
Proceedings of the fourth ACM workshop on Role-based access control, 43-54, 1999
1941999
The system can't perform the operation now. Try again later.
Articles 1–20