Gail‐joon Ahn
#158,804
Most Influential Person Now
Gail‐joon Ahn's AcademicInfluence.com Rankings
Gail‐joon Ahncomputer-science Degrees
Computer Science
#8953
World Rank
#9409
Historical Rank
Operating Systems
#15
World Rank
#16
Historical Rank
Cloud Computing
#40
World Rank
#41
Historical Rank
Algorithms
#355
World Rank
#360
Historical Rank

Download Badge
Computer Science
Gail‐joon Ahn's Degrees
- PhD Computer Science University of Arizona
- Masters Computer Science University of Arizona
Similar Degrees You Can Earn
Why Is Gail‐joon Ahn Influential?
(Suggest an Edit or Addition)Gail‐joon Ahn's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Security and Privacy Challenges in Cloud Computing Environments (2010) (1395)
- Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage (2012) (559)
- Role-based authorization constraints specification (2000) (464)
- Access control in collaborative systems (2005) (352)
- Deep Android Malware Detection (2017) (339)
- Dynamic audit services for integrity verification of outsourced storages in clouds (2011) (331)
- Dynamic Audit Services for Outsourced Storages in Clouds (2013) (293)
- Role-based access control on the web (2001) (265)
- FLOWGUARD: building robust firewalls for software-defined networks (2014) (253)
- Multiparty Access Control for Online Social Networks: Model and Mechanisms (2013) (241)
- A rule-based framework for role-based delegation and revocation (2003) (222)
- Policy-driven security management for fog computing: Preliminary framework and a case study (2014) (190)
- Detecting and Resolving Firewall Policy Anomalies (2012) (165)
- Efficient provable data possession for hybrid clouds (2010) (164)
- SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments (2010) (156)
- Detecting and resolving privacy conflicts for collaborative data sharing in online social networks (2011) (154)
- A role-based delegation framework for healthcare information systems (2002) (147)
- The RSL99 language for role-based separation of duty constraints (1999) (147)
- Collaboration in multicloud computing environments: Framework and security issues (2013) (140)
- A rule-based framework for role based delegation (2001) (126)
- Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin (2016) (124)
- Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection (2018) (118)
- Secure sharing of electronic health records in clouds (2012) (114)
- Injecting RBAC to secure a Web-based workflow system (2000) (111)
- Risk-Aware Mitigation for MANET Routing Attacks (2012) (104)
- Towards temporal access control in cloud computing (2012) (104)
- Efficient audit service outsourcing for data integrity in clouds (2012) (97)
- Morpheus: automatically generating heuristics to detect Android emulators (2014) (94)
- Role-based authorization constraints specification using Object Constraint Language (2001) (91)
- UML-based representation of role-based access control (2000) (87)
- Multiparty Authorization Framework for Data Sharing in Online Social Networks (2011) (86)
- Collaborative integrity verification in hybrid clouds (2011) (82)
- Enabling verification and conformance testing for access control model (2008) (81)
- Patient-centric authorization framework for sharing electronic health records (2009) (80)
- Privacy-Enhanced User-Centric Identity Management (2009) (79)
- Information flow control in cloud computing (2010) (78)
- Representing and Reasoning about Web Access Control Policies (2010) (76)
- Analyzing and Managing Role-Based Access Control Policies (2008) (76)
- RiskMon: continuous and automated risk assessment of mobile applications (2014) (74)
- Access control for online social networks third party applications (2012) (71)
- Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis (2018) (67)
- Towards realizing a formal RBAC model in real systems (2007) (67)
- SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam (2016) (66)
- Anomaly discovery and resolution in web access control policies (2011) (66)
- Patient-centric authorization framework for electronic healthcare services (2011) (66)
- Managing privacy preferences for federated identity management (2005) (64)
- Building problem domain ontology from security requirements in regulatory documents (2006) (56)
- Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale (2020) (56)
- On the Security of Picture Gesture Authentication (2013) (56)
- PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists (2019) (55)
- On modeling system-centric information for role engineering (2003) (54)
- Game theoretic analysis of multiparty access control in online social networks (2014) (54)
- Data and Applications Security XXI (2007) (53)
- Discovery and Resolution of Anomalies in Web Access Control Policies (2013) (51)
- Specification and Validation of Authorisation Constraints Using UML and OCL (2005) (50)
- Toward a Moving Target Defense for Web Applications (2015) (49)
- The rcl 2000 language for specifying role-based authorization constraints (2000) (49)
- HoneyMix: Toward SDN-based Intelligent Honeynet (2016) (44)
- The role control center: features and case studies (2003) (44)
- A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications (2017) (44)
- VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls (2015) (44)
- A collaborative framework for privacy protection in online social networks (2010) (43)
- Zero-knowledge proofs of retrievability (2011) (43)
- Security and Privacy in Social Networks (2011) (42)
- Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues (2019) (42)
- Dynamic and risk-aware network access management (2003) (41)
- Comparison-based encryption for fine-grained access control in clouds (2012) (41)
- Provably Secure Role-Based Encryption with Revocation Mechanism (2011) (39)
- Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance (2006) (38)
- Ensuring information assurance in federated identity management (2004) (38)
- Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) (2016) (37)
- Picture Gesture Authentication (2015) (37)
- Enabling Collaborative data sharing in Google+ (2012) (37)
- Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks (2017) (37)
- vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems (2018) (37)
- Role-based access management for ad-hoc collaborative sharing (2006) (37)
- FAME: a firewall anomaly management environment (2010) (36)
- Role-based privilege and trust management (2005) (35)
- Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy (2013) (33)
- Beyond User-to-User Access Control for Online Social Networks (2008) (33)
- Towards Automated Risk Assessment and Mitigation of Mobile Applications (2015) (32)
- Formal specification of role-based security policies for clinical information systems (2005) (31)
- Visualization based policy analysis: case study in SELinux (2008) (31)
- Towards HIPAA-compliant healthcare systems (2012) (30)
- HoneyProxy: Design and implementation of next-generation honeynet via SDN (2017) (30)
- CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing (2021) (29)
- ACTRA: A Case Study for Threat Information Sharing (2015) (29)
- Authorization management for role-based collaboration (2003) (29)
- Remote Attestation with Domain-Based Integrity Model and Policy Analysis (2012) (28)
- Towards a Reliable SDN Firewall (2014) (28)
- Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection (2003) (27)
- Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone (2018) (26)
- Enforcing Role-Based Access Control Policies in Web Services with UML and OCL (2008) (26)
- Security-Enhanced OSGi Service Environments (2009) (26)
- Specification and classification of role-based authorization policies (2003) (26)
- Towards Automated Threat Intelligence Fusion (2016) (25)
- Cryptographic role-based security mechanisms based on role-key hierarchy (2010) (25)
- Ontology-based policy anomaly management for autonomic computing (2011) (24)
- Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control (2017) (23)
- ACaaS: Access Control as a Service for IaaS Cloud (2013) (22)
- Common criteria requirements modeling and its uses for quality of information assurance (QoIA) (2005) (22)
- AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing (2015) (21)
- Secure Collaborative Integrity Verification for Hybrid Cloud Environments (2012) (21)
- Towards secure information sharing using role-based delegation (2007) (21)
- Certification process artifacts defined as measurable units for software assurance (2007) (20)
- Systematic Policy Analysis for High-Assurance Services in SELinux (2008) (20)
- Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems (2005) (20)
- Proceedings of the tenth ACM symposium on Access control models and technologies (2003) (20)
- Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL (2012) (20)
- Articulating and enforcing authorisation policies with UML and OCL (2005) (20)
- SocialImpact: Systematic Analysis of Underground Social Dynamics (2012) (19)
- AIM-SDN: Attacking Information Mismanagement in SDN-datastores (2018) (19)
- Checking Intent-based Communication in Android with Intent Space Analysis (2016) (19)
- HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems (2020) (19)
- Supporting secure collaborations with attribute-based access control (2013) (18)
- Users Really Do Answer Telephone Scams (2019) (18)
- ROLE-BASED EAM USING X.509 ATTRIBUTE CERTIFICATE∗ (2003) (17)
- Model-Based Conformance Testing for Android (2012) (17)
- Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases (2021) (17)
- Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation (2016) (16)
- Risk assessment of mobile applications based on machine learned malware dataset (2018) (16)
- Risk-Aware Response for Mitigating MANET Routing Attacks (2010) (16)
- Role-based access control in DCOM (2000) (15)
- Secure information sharing using role-based delegation (2004) (15)
- Information Assurance in Federated Identity Management: Experimentations and Issues (2004) (15)
- Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces (2016) (15)
- Efficient Anonymous Message Submission (2012) (15)
- Towards comprehensive and collaborative forensics on email evidence (2013) (15)
- State-aware Network Access Management for Software-Defined Networks (2016) (15)
- Establishing trustworthiness in services of the critical infrastructure through certification and accreditation (2005) (14)
- Towards HIPAA-Compliant Healthcare Systems in Cloud Computing (2012) (13)
- Managing heterogeneous network environments using an extensible policy framework (2007) (13)
- Scam Pandemic: How Attackers Exploit Public Fear through Phishing (2020) (13)
- Role-based Access Control on the Web Using LDAP (2001) (13)
- Constructing Authorization Systems Using Assurance Management Framework (2010) (13)
- Challenges and Preparedness of SDN-based Firewalls (2018) (13)
- Towards System Integrity Protection with Graph-Based Policy Analysis (2009) (13)
- Using instruction sequence abstraction for shellcode detection and attribution (2013) (13)
- User-centric privacy management for federated identity management (2007) (12)
- LPM: Layered Policy Management for Software-Defined Networks (2014) (12)
- Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology (2008) (12)
- Visualization-based policy analysis for SELinux: framework and user study (2013) (11)
- Towards a reliable firewall for software-defined networks (2019) (11)
- Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps (2018) (11)
- Efficient construction of provably secure steganography under ordinary covert channels (2012) (11)
- Data Confidentiality (2009) (11)
- Measuring E-mail header injections on the world wide web (2018) (10)
- SDNSOC: Object Oriented SDN Framework (2019) (10)
- Reasoning about XACML Policy Descriptions in Answer Set Programming ( Preliminary Report ) (2010) (10)
- Defeating Internet attacks using risk awareness and active honeypots (2004) (10)
- Poster: temporal attribute-based encryption in clouds (2011) (10)
- Science DMZ: SDN based secured cloud testbed (2017) (9)
- Access Control Model for Sharing Composite Electronic Health Records (2008) (9)
- Toward an Access Control Model for Sharing Composite Electronic Health Records (2008) (9)
- Federated Access Management for Collaborative Network Environments: Framework and Case Study (2015) (9)
- A role‐based infrastructure management system: design and implementation (2004) (9)
- DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications (2018) (9)
- Portable User-Centric Identity Management (2008) (9)
- A Framework for Enabling User-Controlled Persona in Online Social Networks (2009) (8)
- An application of directory service markup language (DSML) for role-based access control (RBAC) (2002) (8)
- Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks (2007) (8)
- Automatic Extraction of Secrets from Malware (2011) (8)
- Reconstructing a formal security model (2002) (8)
- Decentralized user group assignment in Windows NT (2001) (7)
- Understanding and Predicting Private Interactions in Underground Forums (2019) (7)
- Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control (2017) (7)
- Towards scalable authentication in health services (2002) (7)
- Design and Implementation of Access Control as a Service for IaaS Cloud (2013) (7)
- Examining Social Dynamics for Countering Botnet Attacks (2011) (7)
- 1.2.1 Engineering Information Assurance for Critical Infrastructures: The DITSCAP Automation Study (2005) (6)
- Role-based authorization in decentralized health care environments (2003) (6)
- Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned (2013) (6)
- Towards Role-Based Authorization for OSGi Service Environments (2008) (6)
- Towards trust-aware access management for ad-hoc collaborations (2007) (6)
- The user (2020) (6)
- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems (2010) (6)
- Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling (2018) (6)
- Towards Effective Security Policy Management for Heterogeneous Network Environments (2007) (6)
- Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks (2022) (5)
- Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers (2020) (5)
- Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem (2021) (5)
- Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper) (2016) (5)
- Ransomware and cryptocurrency Partners in crime (2016) (5)
- Towards IA-aware web services for federated identity management (2003) (5)
- Locale-based access control: placing collaborative authorization decisions in context (2003) (5)
- SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture (2020) (5)
- MasterBlaster: Identifying Influential Players in Botnet Transactions (2011) (5)
- Towards collaborative forensics: Preliminary framework (2011) (5)
- Toward Standardization of Authenticated Caller ID Transmission (2017) (5)
- OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements (2017) (4)
- Challenges, Opportunities and a Framework for Web Environment Forensics (2018) (4)
- Supporting access control policies across multiple operating systems (2005) (4)
- Collecting and Analyzing Bots in a Systematic Honeynet-based Testbed Environment (2007) (4)
- Towards role-based administration in network information services (1999) (4)
- Collegiate Cyber Game Design Criteria and Participation (2007) (4)
- Towards the specification of access control policies on multiple operating systems (2004) (4)
- The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS (2018) (3)
- Towards Secure Information Sharing and Management in Grid Environments (2006) (3)
- Role-Based Privilege Management Using Attribute Certificates and Delegation (2004) (3)
- Ontology-Based Risk Evaluation in User-Centric Identity Management (2011) (3)
- Discretionary Access Control (2009) (3)
- Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service (2021) (3)
- Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies (2019) (3)
- Security and Privacy in Cloud Computing: Towards a Comprehensive Framework (2013) (3)
- A role administration system in role-based authorization infrastructures: design and implementation (2003) (3)
- Defining and Detecting Environment Discrimination in Android Apps (2017) (3)
- Enhancing directory virtualization to detect insider activity (2012) (3)
- Extensible policy framework for heterogeneous network environments (2013) (3)
- Proceedings of the 13th Workshop on Privacy in the Electronic Society (2014) (3)
- Data Manipulation Language (2009) (2)
- MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts (2021) (2)
- Database Protection (2009) (2)
- ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing (2006) (2)
- Understanding IRC bot behaviors in network-centric attack detection and prevention framework (2008) (2)
- Authorization Framework for Resource Sharing in Grid Environments (2009) (2)
- EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems (2018) (2)
- Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis (2015) (2)
- ViK: practical mitigation of temporal memory safety violations through object ID inspection (2022) (2)
- E-mail Header Injection Vulnerabilities (2017) (2)
- Group Hierarchies with Constrained User Assignment in Linux (2004) (1)
- Environmental Aware Wireless Sensor Networks for Reconfigurable Manufacturing Systems (2003) (1)
- Interactive Exploration of the AFS File System (2004) (1)
- SDN-NFV security 2016 preface (2016) (1)
- Role-based Trust Assignment in Trust Management Systems (2004) (1)
- Achieving security assurance with assertion-based application construction (2014) (1)
- Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results (2013) (1)
- Risk assessment of mobile applications based on machine learned malware dataset (2017) (1)
- dbling: Identifying extensions installed on encrypted web thin clients (2016) (1)
- Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies (2019) (1)
- Proceedings of the 3rd ACM workshop on Assurable and usable security configuration (2010) (1)
- RiskPol: A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies (2018) (1)
- Assured Resource Sharing in Ad-Hoc Collaboration (2015) (1)
- Policy-driven role-based access management for ad-hoc collaboration (2012) (1)
- ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems (2019) (1)
- Active Automation of the DITSCAP (2005) (1)
- Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies (2021) (1)
- Simulation-based validation for smart grid environments (2013) (1)
- iCore: continuous and proactive extrospection on multi-core IoT devices (2019) (1)
- TripleMon: A multi-layer security framework for mediating inter-process communication on Android (2016) (1)
- DyPolDroid: Protecting Against Permission-Abuse Attacks in Android (2022) (1)
- Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings (2007) (1)
- Document Identifier (2020) (1)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012) (1)
- CacheLight: Defeating the CacheKit Attack (2018) (1)
- Special track on internet of things (IoT) (2018) (0)
- Adopting roles in network information services (1999) (0)
- Decentralized Data Integration System (2009) (0)
- Session details: Distributed systems: IoT - internet of things track (2018) (0)
- Session details: Access control (2003) (0)
- 2 SocialImpact : Bring Order to Online Underground Social Dynamics (2012) (0)
- Session details: Theme: System software and security: IoT - Internet of things track (2021) (0)
- Towards Collaborative Forensics (2013) (0)
- Data Types for Moving Objects (2009) (0)
- Second Annual Workshop on Information Assurance Research and Education Information Assurance Center Arizona State University (2010) (0)
- Access Control Management for SCADA Systems (2008) (0)
- Data Perturbation (2009) (0)
- Special track on smart grid and smart technologies (2013) (0)
- Session details: Theme: System software and security: IoT - Internet of things track (2019) (0)
- Degrees of Consistency (2009) (0)
- Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (2016) (0)
- Session details: Consistency enforcement and secure grids (2007) (0)
- Malware Analysis and Classification Framework Detecting Financial Malware Using Machine Learning Techniques (2016) (0)
- Internet-scale intrusion detection and prevention (2006) (0)
- Foreword - Proceedings of the ACM Conference on Computer and Communications Security (2014) (0)
- Challenges to multi-enterprise integration: The EECOMS experience (2003) (0)
- Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security (2014) (0)
- CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing (2022) (0)
- Session details: Security analysis (2004) (0)
- Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, WISCS '14, Scottsdale, Arizona, USA, November 3, 2014 (2014) (0)
- Editorial Advisory Board (2012) (0)
- A proposed proxy-based multicloud computing framework allows dynamic, on- the-fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collabora- tion agreements or standardized interfaces. (2013) (0)
- Listing 1 : Implementation for MOVS in AMD processors (2014) (0)
- Socio-metrics: Identifying Invisible Deviant Adversaries (2015) (0)
- Session details: DIM security and authentication (2005) (0)
- Role-based delegation: models and mechanisms (2006) (0)
- Securing and utilizing social dynamics (2011) (0)
- Assured resource sharing in Grid environments (2011) (0)
- *asu Faculty Member , **non-asu Faculty Member*/researcher Annual Symposium on Information Assurance Research and Education (0)
- Session details: Volume II: Software development, system software and security: Smart grid and smart technologies track (2015) (0)
- Secure Consolidated Authorization Mechanism for Supply Chain Management (2001) (0)
- Session details: Network configuration and access control (2010) (0)
- Data Cache (2009) (0)
- SmokeBomb (2020) (0)
- Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems (2020) (0)
- Discovering and analyzing deviant communities: Methods and experiments (2014) (0)
- CONUGA: Constrained User-Group Assignment (2001) (0)
- The 2nd International Workshop on Web and Pervasive Security (WPS 2008) (2008) (0)
- Session details: Role based access control (2010) (0)
- Role-based access control for trust management: model, processes, and management (2005) (0)
- Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux (2007) (0)
- Visualization-based policy analysis for SELinux: framework and user study (2012) (0)
- Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms (2014) (0)
- Towards adaptive and proactive security assessment for energy delivery systems (2017) (0)
- I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior (2022) (0)
- WPES 2014: 13th Workshop on Privacy in the Electronic Society (2014) (0)
- Session details: Keynote I (2003) (0)
- Session details: Keynote Address II (2014) (0)
- A Cloud-based Resource and Service Sharing Platform for Computer and Network Security Education (0)
- Cloud 2015 Program Committee (2015) (0)
- Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control (2016) (0)
- Session details: Volume II: Software design and development, and system software and security: Smart grid and smart technologies track (2016) (0)
- Challenges to Multi-Enterprise Integration (2002) (0)
- Secure and efficient constructions of hash, MAC and PRF for mobile devices (2012) (0)
- A role-based infrastructure management system: design and implementation: Research Articles (2004) (0)
- Authentication , Authorisation & Accountability ( AAA ) Knowledge Area Issue 1 . 0 (2019) (0)
- Constrained Role-based Delegation (2003) (0)
- Enabling Collaborative Data Sharing in Google + ( Technical Report , SEFCOM , March 2012 ) (2012) (0)
- Efficient construction of provably secure steganography under ordinary covert channels (2012) (0)
- Interactive exploration of large filesystems (2005) (0)
- Using X.509 Attribute Certificates for Role-Based EAM (2002) (0)
- Session details: Policy analysis (2013) (0)
- Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies (2020) (0)
- Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security (2007) (0)
- Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme (2016) (0)
- Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014 (2014) (0)
- Proceedings of the 19th Workshop on Privacy in the Electronic Society (2014) (0)
- Preface - WISA 2014 (2015) (0)
- DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android (2021) (0)
- Session details: Theme: System software and security: IoT - Internet of things track (2020) (0)
- Consumer perceptions of Personal Health Record ( PHR ) privacy and security (2011) (0)
- Editorial message: Special track on internet of things (IoT) (2020) (0)
- Data Errors (2022) (0)
- Session details: Keynote Address I (2018) (0)
- Data Tracking (2009) (0)
- Secure and efficient random functions with variable-length output (2014) (0)
- Development of a multi-layered botmaster based analysis framework (2011) (0)
- Automated Risk Assessment of Mobile Applications (0)
- Digital Surface Model (2009) (0)
- ExSol (2021) (0)
- Perceived Confidentiality of Mobile Application Data (2013) (0)
- SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms (2018) (0)
- Distance-Preserving Mapping (2009) (0)
- Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: smart grid and smart technologies track (2013) (0)
- Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks (2021) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Gail‐joon Ahn?
Gail‐joon Ahn is affiliated with the following schools: