If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Conference contribution
2013
11 Citations (Scopus)

ACaaS: Access control as a service for IaaS cloud

Wu, R., Zhang, X., Ahn, G-J., Sharifi, H. & Xie, H., 2013, Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013. p. 423-428 6 p. 6693363

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Web services
Outsourcing
Service oriented architecture (SOA)
Industry

Simulation-based validation for smart grid environments

Han, W., Mabey, M. & Ahn, G-J., 2013, Proceedings of the 2013 IEEE 14th International Conference on Information Reuse and Integration, IEEE IRI 2013. IEEE Computer Society, p. 14-21 8 p. 6642448

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Large scale systems
Critical infrastructures
Discrete event simulation
Specifications
Recovery
8 Citations (Scopus)

Supporting secure collaborations with attribute-based access control

Rubio-Medrano, C. E., D'Souza, C. & Ahn, G-J., 2013, Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. p. 525-530 6 p. 6680020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
6 Citations (Scopus)

Towards comprehensive and collaborative forensics on email evidence

Paglierani, J., Mabey, M. & Ahn, G-J., 2013, Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. p. 11-20 10 p. 6679965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Crime
6 Citations (Scopus)

Using instruction sequence abstraction for shellcode detection and attribution

Zhao, Z. & Ahn, G-J., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 323-331 9 p. 6682722

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Markov processes
Support vector machines
Feature extraction
1 Citation (Scopus)

Verifying access control properties with design by contract: Framework and lessons learned

Rubio-Medrano, C. E., Ahn, G-J. & Sohr, K., 2013, Proceedings - International Computer Software and Applications Conference. p. 21-26 6 p. 6649794

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
2012
24 Citations (Scopus)

Comparison-based encryption for fine-grained access control in clouds

Zhu, Y., Hu, H., Ahn, G-J., Yu, M. & Zhao, H., 2012, CODASPY'12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. p. 105-116 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
Cloud computing
Servers
Experiments
13 Citations (Scopus)

Enabling collaborative data sharing in Google+

Hu, H., Ahn, G-J. & Jorgensen, J., 2012, GLOBECOM - IEEE Global Telecommunications Conference. p. 720-725 6 p. 6503198

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Specifications
9 Citations (Scopus)

Model-based conformance testing for android

Jing, Y., Ahn, G-J. & Hu, H., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7631 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Conformance Testing
Model-based Testing
Smartphones
Testing
Mobile devices

Secure and efficient constructions of hash, MAC and PRF for mobile devices

Zhu, Y., Wang, S., Ma, D., Hu, H. & Ahn, G-J., 2012, GLOBECOM - IEEE Global Telecommunications Conference. p. 949-954 6 p. 6503235

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
Convolution
Processing
51 Citations (Scopus)

Secure sharing of electronic health records in clouds

Wu, R., Ahn, G-J. & Hu, H., 2012, CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. p. 711-718 8 p. 6450972

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Electronic medical equipment
Health
Cloud computing
Interoperability
7 Citations (Scopus)

SocialImpact: Systematic analysis of underground social dynamics

Zhao, Z., Ahn, G-J., Hu, H. & Mahi, D., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7459 LNCS. p. 877-894 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7459 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Dynamics
Attack
Internet
Social Networks
Mining
16 Citations (Scopus)

Towards HIPAA-compliant healthcare systems

Wu, R., Ahn, G-J. & Hu, H., 2012, IHI'12 - Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. p. 593-601 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health Insurance Portability and Accountability Act
Delivery of Health Care
Government Regulation
Disclosure
Health Personnel
45 Citations (Scopus)

Towards temporal access control in cloud computing

Zhu, Y., Hu, H., Ahn, G-J., Huang, D. & Wang, S., 2012, Proceedings - IEEE INFOCOM. p. 2576-2580 5 p. 6195656

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Access control
Cryptography
2011
33 Citations (Scopus)

Anomaly discovery and resolution in Web access control policies

Hu, H., Ahn, G-J. & Kulkarni, K., 2011, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 165-174 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Markup languages
Cloud computing
Industry
Internet
4 Citations (Scopus)

Automatic extraction of secrets from malware

Zhao, Z., Ahn, G-J. & Hu, H., 2011, Proceedings - Working Conference on Reverse Engineering, WCRE. p. 159-168 10 p. 6079838

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Crime
Malware
36 Citations (Scopus)

Collaborative integrity verification in hybrid clouds

Zhu, Y., Hu, H., Ahn, G-J., Han, Y. & Chen, S., 2011, ColiaborateCom 2011 - Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing. p. 191-200 10 p. 6144804

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Cloud computing
Communication
Experiments
57 Citations (Scopus)

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks

Hu, H., Ahn, G-J. & Jorgensen, J., 2011, ACM International Conference Proceeding Series. p. 103-112 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

135 Citations (Scopus)

Dynamic audit services for integrity verification of outsourced storages in clouds

Zhu, Y., Wang, H., Hu, Z., Ahn, G-J., Hu, H. & Yau, S-S., 2011, Proceedings of the ACM Symposium on Applied Computing. p. 1550-1557 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Sampling
4 Citations (Scopus)

Examining social dynamics for countering botnet attacks

Zhao, Z., Ahn, G-J. & Hu, H., 2011, GLOBECOM - IEEE Global Telecommunications Conference. 6134468

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet
Malware
6 Citations (Scopus)

MasterBlaster: Identifying influential players in botnet transactions

Paxton, N. C., Ahn, G-J. & Shehab, M., 2011, Proceedings - International Computer Software and Applications Conference. p. 413-419 7 p. 6032373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Botnet
Monitoring
Computer networks
Computer systems
Communication
32 Citations (Scopus)

Multiparty authorization framework for data sharing in online social networks

Hu, H. & Ahn, G-J., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6818 LNCS. p. 29-43 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Sharing
Authorization
Access control
Social Networks
Internet
15 Citations (Scopus)

Ontology-based policy anomaly management for autonomic computing

Hu, H., Ahn, G-J. & Kulkarni, K., 2011, ColiaborateCom 2011 - Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing. p. 487-494 8 p. 6144770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ontology
Service oriented architecture (SOA)
Cloud computing
Access control
Industry
2 Citations (Scopus)

Ontology-based risk evaluation in user-centric identity management

Ahn, G-J. & Sekar, P., 2011, IEEE International Conference on Communications. 5962948

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ontology
Access control
3 Citations (Scopus)

Towards collaborative forensics: Preliminary framework

Mabey, M. & Ahn, G-J., 2011, Proceedings of the 2011 IEEE International Conference on Information Reuse and Integration, IRI 2011. p. 94-99 6 p. 6009527

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
XML
Digital forensics
Incidents
Cybercrime
2010
18 Citations (Scopus)

A collaborative framework for privacy protection in online social networks

Zhu, Y., Hu, Z., Wang, H., Hu, H. & Ahn, G-J., 2010, Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010. 5766999

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Access control
Cryptography
14 Citations (Scopus)

Cryptographic role-based security mechanisms based on role-key hierarchy

Zhu, Y., Ahn, G-J., Hu, H. & Wang, H., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 314-319 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
3 Citations (Scopus)

DR@FT: Efficient remote attestation framework for dynamic systems

Xu, W., Ahn, G-J., Hu, H., Zhang, X. & Seifert, J. P., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6345 LNCS. p. 182-198 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6345 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
Dynamic Systems
Dynamical systems
Information systems
Trustworthiness
60 Citations (Scopus)

Efficient provable data possession for hybrid clouds

Zhu, Y., Wang, H., Hu, Z., Ahn, G-J., Hu, H. & Yau, S-S., 2010, Proceedings of the ACM Conference on Computer and Communications Security. p. 756-758 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Outsourcing
Scalability
Communication
Experiments
14 Citations (Scopus)

FAME: A firewall anomaly management environment

Hu, H., Ahn, G-J. & Kulkarni, K., 2010, Proceedings of the ACM Conference on Computer and Communications Security. p. 17-26 10 p. 1866902

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Industry
42 Citations (Scopus)

Information flow control in cloud computing

Wu, R., Ahn, G-J., Hu, H. & Singhal, M., 2010, Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010. 5767047

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Flow control
Security of data
Access control
Servers
34 Citations (Scopus)

Representing and reasoning about web access control policies

Ahn, G-J., Hu, H., Lee, J. & Meng, Y., 2010, Proceedings - International Computer Software and Applications Conference. p. 137-146 10 p. 5676253

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Markup languages
Service oriented architecture (SOA)
Cloud computing
Web services
7 Citations (Scopus)

Risk-aware response for mitigating MANET routing attacks

Zhao, Z., Hu, H., Ahn, G-J. & Wu, R., 2010, GLOBECOM - IEEE Global Telecommunications Conference. 5683548

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Mobile ad hoc networks
Costs
Experiments
84 Citations (Scopus)

SecureCloud: Towards a comprehensive security framework for cloud computing environments

Takabi, H., Joshi, J. B. D. & Ahn, G-J., 2010, Proceedings - International Computer Software and Applications Conference. p. 393-398 6 p. 5615236

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Cost reduction
Momentum
2009
5 Citations (Scopus)

Access control model for sharing composite Electronic Health Records

Jin, J., Ahn, G-J., Covington, M. J. & Zhang, X., 2009, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Vol. 10 LNICST. p. 340-354 15 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 10 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Health
Composite materials
Semantics
Chemical analysis
3 Citations (Scopus)

A framework for enabling user-controlled persona in online social networks

Shin, D., Lopes, R., Claycomb, W. & Ahn, G-J., 2009, Proceedings - International Computer Software and Applications Conference. Vol. 1. p. 292-297 6 p. 5254249

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Specifications
1 Citation (Scopus)

Authorization framework for resource sharing in grid environments

Jin, J. & Ahn, G-J., 2009, Communications in Computer and Information Science. Vol. 63. p. 148-155 8 p. (Communications in Computer and Information Science; vol. 63).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
52 Citations (Scopus)

Patient-centric authorization framework for sharing electronic health records

Jin, J., Ahn, G-J., Hu, H., Covington, M. J. & Zhang, X., 2009, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 125-134 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Health
Agglomeration
Composite materials
Chemical analysis
41 Citations (Scopus)

Privacy-enhanced user-centric identity management

Ahn, G-J., Ko, M. & Shehab, M., 2009, IEEE International Conference on Communications. 5199363

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
6 Citations (Scopus)

Towards system integrity protection with graph-based policy analysis

Xu, W., Zhang, X. & Ahn, G-J., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5645 LNCS. p. 65-80 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5645 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Integrity
Graph in graph theory
Trusted Computing
Security Policy
2008
18 Citations (Scopus)

Beyond user-to-user access control for online social networks

Shehab, M., Squicciarini, A. C. & Ahn, G-J., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5308 LNCS. p. 174-189 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5308 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Social Networks
Attribute
User Profile
56 Citations (Scopus)

Enabling Verification and conformance testing for access control model

Hu, H. & Ahn, G-J., 2008, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 195-204 10 p. 1377867

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Testing
Control systems
Systems analysis
Formal specification
20 Citations (Scopus)

Enforcing role-based access control policies in Web Services with UML and OCL

Sohr, K., Mustafa, T., Bao, X. & Ahn, G-J., 2008, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 257-266 10 p. 4721563

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Web services
Engines
3 Citations (Scopus)

Portable user-centric identity management

Ahn, G-J., Ko, M. N. & Shehab, M., 2008, IFIP International Federation for Information Processing. Vol. 278. p. 573-587 15 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity management
Portability
World Wide Web
Management system
Management practices
8 Citations (Scopus)

Risk evaluation for personal identity management based on privacy attribute ontology

Iwaihara, M., Murakami, K., Ahn, G-J. & Yoshikawa, M., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5231 LNCS. p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5231 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity Management
Risk Evaluation
Privacy
Ontology
Attribute
17 Citations (Scopus)

Systematic policy analysis for high-assurance services in SELinux

Ahn, G-J., Xu, W. & Zhang, X., 2008, Proceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008. p. 3-10 8 p. 4556572

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Petri nets
Trusted computing
4 Citations (Scopus)

Towards role-based authorization for OSGi service environments

Ahn, G-J., Hu, H. & Jin, J., 2008, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems. p. 23-29 7 p. 4683110

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Local area networks
Automobiles
2 Citations (Scopus)

Understanding IRC bot behaviors in network-centric attack detection and prevention framework

Ahn, G-J., Paxton, N. & Pearson, K., 2008, 3rd International Conference on Information Warfare and Security. Academic Conferences Limited, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Electronic mail
Botnet
Internet
Scanning
17 Citations (Scopus)

Visualization based policy analysis: Case study in SELinux

Xu, W., Shehab, M. & Ahn, G-J., 2008, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 165-174 10 p. 1377863

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Query languages
Semantics
Substrates
2007
1 Citation (Scopus)

Collegiate cyber game design criteria and participation

Chu, B. T., Ahn, G-J., Blanchard, S., Deese, J., Kelly, R., Yu, H. & Young, A., 2007, Proceedings - 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007; 1st IEEE/ACIS International Workshop on e-Activity, IWEA 2007. p. 1036-1041 6 p. 4276520

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Curricula
Education