If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Conference contribution
2007
1 Citation (Scopus)

Data and applications security XXI: 21st annual IFIP WG 11.3working conference on data and applications security redondo beach, CA, USA, july 8-11, 2007 proceedings

Barker, S. & Ahn, G-J., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 4602. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4602).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Beaches
Annual

Enabling role-based delegation and revocation on security-enhanced Linux

Ahn, G-J. & Garni, D., 2007, Proceedings - IEEE Symposium on Computers and Communications. p. 865-870 6 p. 4381574

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Access control
Linux
Planning
10 Citations (Scopus)

Managing heterogeneous network environments using an extensible policy framework

Teo, L. & Ahn, G-J., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 362-364 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterogeneous networks
Intrusion detection
Computer networks
Internet
4 Citations (Scopus)

Towards effective security policy management for heterogeneous network environments

Teo, L. & Ahn, G-J., 2007, Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007. p. 241-245 5 p. 4262593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterogeneous networks
11 Citations (Scopus)

Towards practical framework for collecting and analyzing network-centric attacks

Paxton, N., Ahn, G-J. & Chu, B., 2007, 2007 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2007. p. 73-78 6 p. 4296600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Network management
Productivity
Attack
Botnet
28 Citations (Scopus)

Towards realizing a formal RBAC model in real systems

Ahn, G-J. & Hu, H., 2007, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 215-224 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software engineering
Specifications
7 Citations (Scopus)

Towards trust-aware access management for ad-hoc collaborations

Jin, J., Ahn, G-J., Shehab, M. & Hu, H., 2007, Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007. p. 41-48 8 p. 4553807

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
6 Citations (Scopus)

User-centric privacy management for federated identity management

Ahn, G-J. & Ko, M., 2007, Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007. p. 187-195 9 p. 4553829

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Internet
2006
23 Citations (Scopus)

Building problem domain ontology from security requirements in regulatory documents

Lee, S. W., Gandhi, R., Muthurajan, D., Yavagal, D. & Ahn, G-J., May 21 2006, Proceedings - International Conference on Software Engineering. IEEE Computer Society, Vol. 2006-May. p. 43-49 7 p. 1137635

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Accreditation
Ontology
Knowledge engineering
Requirements engineering
Information technology
29 Citations (Scopus)

Role-based access management for ad-hoc collaborative sharing

Jin, J. & Ahn, G-J., 2006, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. Vol. 2006. p. 200-209 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
1 Citation (Scopus)

ShareEnabler: Policy-driven access management for ad-hoc collaborative sharing

Jin, J., Ahn, G-J. & Singhal, M., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4254 LNCS. p. 724-740 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4254 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Sharing
Authorization
Information Dissemination
Heterogeneous networks
2 Citations (Scopus)

Towards secure information sharing and management in grid environments

Jin, G. & Ahn, G-J., 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom. 4207564

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Web services
authorization
management
infrastructure
2005
1 Citation (Scopus)

Active automation of the DITSCAP

Lee, S. W., Gandhi, R. A., Ahn, G-J. & Yavagal, D. S., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 479-485 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automation
Critical infrastructures
Accreditation
Multimedia services
Information technology
10 Citations (Scopus)

Articulating and enforcing authorisation policies with UML and OCL

Sohr, K., Ahn, G-J. & Migge, L., May 15 2005, SESS 2005 - Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications. Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Access control
Software engineering
Computer systems
Specifications
10 Citations (Scopus)

Common Criteria requirements modeling and its uses for Quality of Information Assurance (QoIA)

Yavagal, D. S., Won Lee, S., Ahn, G-J. & Gandhi, R. A., 2005, Proceedings of the Annual Southeast Conference. Vol. 2. p. 2130-2135 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Requirements engineering
Knowledge engineering
Accreditation
Information technology
Ontology
4 Citations (Scopus)

Engineering information assurance for critical infrastructures: The DITSCAP automation study

Lee, S. W., Ahn, G-J. & Gandhi, R. A., 2005, 15th Annual International Symposium of the International Council on Systems Engineering, INCOSE 2005. Vol. 1. p. 50-62 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Accreditation
Information technology
Automation
5 Citations (Scopus)

Establishing trustworthiness in services of the critical infrastructure through certification and accreditation

Lee, S. W., Gandhi, R. A. & Ahn, G-J., May 15 2005, SESS 2005 - Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications. Association for Computing Machinery, Inc

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Critical infrastructures
Accreditation
Knowledge engineering
Requirements engineering
Information technology
18 Citations (Scopus)

Formal specification of role-based security policies for clinical information systems

Sohr, K., Drouineaud, M. & Ahn, G-J., 2005, Proceedings of the ACM Symposium on Applied Computing. Vol. 1. p. 332-339 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Information systems
Data privacy
Ink
Availability

Interactive exploration of large filesystems

Foster, J., Subramanian, K. & Ahn, G-J., 2005, Proceedings of SPIE - The International Society for Optical Engineering. Erbacher, R. F., Roberts, J. C., Grohn, M. T. & Borner, K. (eds.). Vol. 5669. p. 307-315 9 p. 30

Research output: Chapter in Book/Report/Conference proceedingConference contribution

files
Access control
access control
Visualization
directories
28 Citations (Scopus)

Managing privacy preferences for federated identity management

Ahn, G-J. & Lam, J., 2005, Proceedings of the ACM Conference on Computer and Communications Security. p. 28-36 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Internet
30 Citations (Scopus)

Specification and validation of authorisation constraints using UML and OCL

Sohr, K., Ahn, G-J., Gogolla, M. & Migge, L., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3679 LNCS. p. 64-79 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3679 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unified Modeling Language
Specification languages
Authorization
Language
Specification
1 Citation (Scopus)

Supporting access control policies across multiple operating systems

Teo, L. & Ahn, G-J., 2005, Proceedings of the Annual Southeast Conference. Vol. 2. p. 2288-2293 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Access control
Specification languages
Large scale systems
Computer systems
2004
8 Citations (Scopus)

Defeating Internet attacks using risk awareness and active honeypots

Teo, L., Sun, Y. A. & Ahn, G-J., 2004, Proceedings - Second IEEE Information Assurance Workshop. p. 155-167 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Petri nets
29 Citations (Scopus)

Ensuring information assurance in federated identity management

Shin, D., Ahn, G-J. & Shenoy, P., 2004, IEEE International Performance, Computing and Communications Conference, Proceedings. Hassanein, H., Oliver, R. L., Richard, III, G. G. & Wilson, L. F. (eds.). Vol. 23. p. 821-826 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Web services
Industry
10 Citations (Scopus)

Secure information sharing using role-based delegation

Ahn, G-J. & Mohan, B., 2004, International Conference on Information Technology: Coding Computing, ITCC. Srimani, P. K., Abraham, A., Cannataro, M., Domingo-Ferrer, J. & Hashemi, R. (eds.). Vol. 2. p. 810-815 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Personnel
4 Citations (Scopus)

Towards the specification of access control policies on multiple operating systems

Teo, L. & Ahn, G-J., 2004, Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC. p. 210-217 8 p. 434

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Specifications
Specification languages
UNIX
Computer operating systems
2003
2 Citations (Scopus)

A role administration system in role-based authorization infrastructures - Design and implementation

Shin, D., Ahn, G-J., Cho, S. & Jin, S., 2003, Proceedings of the ACM Symposium on Applied Computing. Lamont, G. (ed.). p. 325-330 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
18 Citations (Scopus)

Authorization management for role-based collaboration

Ahn, G-J., Zhang, L., Shin, D. & Chu, B., 2003, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Vol. 5. p. 4128-4134 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Specifications
Experiments
1 Citation (Scopus)

Challenges to multi-enterprise integration: The EECOMS experience

Tolone, W. J., Chu, B. T., Ahn, G-J., Wilhelm, R. G. & Sims, J. E., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 108. p. 205-216 12 p. (IFIP Advances in Information and Communication Technology; vol. 108).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enterprise integration
Business process
Integral
Lessons learned
Supply chain planning

Constrained role-based delegation

Zhang, L. & Ahn, G-J., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 122. p. 289-300 12 p. (IFIP Advances in Information and Communication Technology; vol. 122).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authorization
Delegation
Access control
Resource use
Exercise
14 Citations (Scopus)

Dynamic and risk-aware network access management

Teo, L., Ahn, G-J. & Zheng, Y., 2003, Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002). p. 217-230 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
Intrusion detection
Access control
2 Citations (Scopus)

Locale-based access control: Placing collaborative authorization decisions in context

Tolone, W. J., Gandhi, R. A. & Ahn, G-J., 2003, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics. Vol. 5. p. 4120-4127 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
38 Citations (Scopus)

On modeling system-centric information for role engineering

Shin, D., Ahn, G-J., Cho, S. & Jin, S., 2003, Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002). p. 169-178 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Communication
3 Citations (Scopus)

Role-based authorization in decentralized health care environments

Ahn, G-J. & Mohan, B., 2003, Proceedings of the ACM Symposium on Applied Computing. Lamont, G. (ed.). p. 251-256 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health care
Access control
Software architecture
Intranets
Online systems
15 Citations (Scopus)

Specification and classification of role-based authorization policies

Ahn, G-J., 2003, Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE. IEEE Computer Society, Vol. 2003-January. p. 202-207 6 p. 1231408

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Specifications
Formal languages
21 Citations (Scopus)

The role control center: Features and case studies

Ferraiolo, D. F., Ahn, G-J., Chandramouli, R. & Gavrila, S. I., 2003, Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002). p. 12-20 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Industry
Specifications
5 Citations (Scopus)

Towards IA-aware web services for federated identity management

Shenoy, P., Shin, D. & Ahn, G-J., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 220-225 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web services

Using X.509 attribute certificates for role-based EAM

Shin, D., Ahn, G-J. & Cho, S., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 128. p. 49-60 12 p. (IFIP Advances in Information and Communication Technology; vol. 128).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extranet
Role-based access control
Experiment
Authorization
2002
6 Citations (Scopus)

An application of directory service markup language (DSML) for role-based access control (RBAC)

Shin, D., Ahn, G-J. & Park, J. S., 2002, Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. p. 934-939 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markup languages
Access control
XML
Information services
World Wide Web
76 Citations (Scopus)

A role-based delegation framework for healthcare information systems

Zhang, L., Ahn, G-J. & Chu, B. T., 2002, Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002). p. 125-134 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Specifications
2 Citations (Scopus)

Towards scalable authentication in health services

Ahn, G-J. & Shin, D., 2002, Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE. IEEE Computer Society, Vol. 2002-January. p. 83-88 6 p. 1029993

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Health
Health insurance
Digital storage
Internet
2001
99 Citations (Scopus)

A rule-based framework for role-based delegation

Zhang, L., Ahn, G-J. & Chu, B. T., 2001, Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001). p. 153-162 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Power (Psychology)
53 Citations (Scopus)

Role-based authorization constraints specification using Object Constraint Language

Ahn, G-J. & Shin, M. E., 2001, Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE. IEEE Computer Society, Vol. 2001-January. p. 157-162 6 p. 953406

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Specification languages
Specifications
Unified Modeling Language
Software engineering
2000
52 Citations (Scopus)

UML-based representation of role-based access control

Shin, M. E. & Ahn, G-J., 2000, Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE. IEEE Computer Society, Vol. 2000-January. p. 195-200 6 p. 883728

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unified Modeling Language
Access control
Engineers