If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Chapter
2016
2 Citations (Scopus)

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

offense
2013
10 Citations (Scopus)

Security and privacy in cloud computing: Towards a comprehensive framework

Takabi, H., Joshi, J. B. D. & Ahn, G-J., 2013, Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, p. 164-184 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cloud computing
Cost reduction
Momentum

Towards collaborative forensics

Mabey, M. & Ahn, G-J., Nov 1 2013, Information Reuse and Integration in Academia and Industry. Springer-Verlag Wien, Vol. 9783709115381. p. 237-260 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Crime
Digital forensics
2000
73 Citations (Scopus)

Injecting RBAC to secure a web-based workflow system

Ahn, G-J., Sandhu, R., Kang, M. & Park, J., 2000, Proceedings of the ACM Workshop on Role-Based Access Control. New York, NY, United States: ACM, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Access control
Servers
Network security
Authentication
Network protocols