If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Article
2018
1 Citation (Scopus)

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

Cho, H., Yi, J. H. & Ahn, G-J., Jan 1 2018, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Monitoring
Hooks
Application programming interfaces (API)
Flow control
Virtual machine
2 Citations (Scopus)

Efficient Anonymous Message Submission

Zhao, X., Li, L., Xue, G. & Ahn, G-J., Mar 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 217-230 14 p.

Research output: Contribution to journalArticle

Cryptography
1 Citation (Scopus)

Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps

Chen, J., Wang, C., He, K., Zhao, Z., Chen, M., Du, R. & Ahn, G-J., Jan 1 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing.

Research output: Contribution to journalArticle

Application programs
Risk assessment
Semantics
Fuzzy clustering
Ecosystems
2017
2 Citations (Scopus)

Risk assessment of mobile applications based on machine learned malware dataset

Kim, H., Cho, T., Ahn, G-J. & Hyun Yi, J., May 5 2017, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Contribution to journalArticle

Risk assessment
Identification (control systems)
Malware
Mobile devices
23 Citations (Scopus)

Uncovering the Face of Android Ransomware: Characterization and Real-time Detection

Chen, J., Wang, C., Zhao, Z., Chen, K., Du, R. & Ahn, G-J., Dec 27 2017, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Malware
Viruses
Cryptography
2016
1 Citation (Scopus)

dbling: Identifying extensions installed on encrypted web thin clients

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Aug 7 2016, In : Digital Investigation. 18, p. S55-S65

Research output: Contribution to journalArticle

Application programs
Digital storage
Dermatoglyphics
digital media
Equipment and Supplies
3 Citations (Scopus)

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces

Zhao, Z., Sankaran, M., Ahn, G-J., Holt, T. J., Jing, Y. & Hu, H., May 1 2016, In : IEEE Security and Privacy. 14, 3, p. 32-43 12 p., 7478573.

Research output: Contribution to journalArticle

sale
commerce
Seals
Sales
migration

SDN-NFV security 2016 preface

Ahn, G-J., Gu, G., Hu, H. & Shin, S., Mar 11 2016, In : Unknown Journal. p. iii

Research output: Contribution to journalArticle

TripleMon: A multi-layer security framework for mediating inter-process communication on Android

Jing, Y., Ahn, G-J., Hu, H., Cho, H. & Zhao, Z., 2016, In : Journal of Computer Security. 24, 4, p. 405-426 22 p.

Research output: Contribution to journalArticle

Smartphones
Communication
Mobile devices
Android (operating system)
Malware
2015
12 Citations (Scopus)
Authentication
Windows operating system
Touch screens
Cracks
16 Citations (Scopus)

Towards Automated Risk Assessment and Mitigation of Mobile Applications

Jing, Y., Ahn, G-J., Zhao, Z. & Hu, H., Sep 1 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 5, p. 571-584 14 p., 6942253.

Research output: Contribution to journalArticle

Risk assessment
2014

ACM CCS 2014 General Chair's Welcome

Ahn, G-J., Nov 3 2014, In : Unknown Journal. p. iii

Research output: Contribution to journalArticle

Foreword

Dimitrakakis, C., Mitrokotsa, A., Rubinstein, B. & Ahn, G-J., Nov 7 2014, In : Unknown Journal. 2014-November, November, p. ii

Research output: Contribution to journalArticle

Guest editors' introduction: Special issue on security and privacy in mobile platforms

Ahn, G-J., Enck, W. & Dongwan Shin, D., 2014, In : IEEE Transactions on Dependable and Secure Computing. 11, 3, p. 209-210 2 p., 6814306.

Research output: Contribution to journalArticle

Secure and efficient random functions with variable-length output

Zhu, Y., Ma, D., Hu, C., Ahn, G-J. & Hu, H., 2014, In : Journal of Network and Computer Applications. 45, p. 121-133 13 p.

Research output: Contribution to journalArticle

Statistical tests
Convolution
Experiments

Simulation-based validation for Smart Grid environments: Framework and experimental results

Han, W., Mabey, M., Ahn, G-J. & Kim, T. S., 2014, In : Advances in Intelligent Systems and Computing. 263, p. 27-44 18 p.

Research output: Contribution to journalArticle

Large scale systems
Critical infrastructures
Discrete event simulation
Specifications
Recovery
2013
76 Citations (Scopus)

Collaboration in multicloud computing environments: Framework and security issues

Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G-J. & Bertino, E., 2013, In : Computer. 46, 2, p. 76-84 9 p., 6457385.

Research output: Contribution to journalArticle

31 Citations (Scopus)

Discovery and resolution of anomalies in web access control policies

Hu, H., Ahn, G-J. & Kulkarni, K., Nov 2013, In : IEEE Transactions on Dependable and Secure Computing. 10, 6, p. 341-354 14 p., 6482139.

Research output: Contribution to journalArticle

Access control
World Wide Web
Markup languages
Service oriented architecture (SOA)
Cloud computing
134 Citations (Scopus)

Dynamic audit services for outsourced storages in clouds

Zhu, Y., Ahn, G-J., Hu, H., Yau, S-S., An, H. G. & Hu, C. J., 2013, In : IEEE Transactions on Services Computing. 6, 2, p. 227-238 12 p., 5999652.

Research output: Contribution to journalArticle

Metadata
Sampling
Audit
Integrity
1 Citation (Scopus)

Extensible policy framework for heterogeneous network environments

Teo, L. & Ahn, G-J., 2013, In : International Journal of Information and Computer Security. 5, 4, p. 251-274 24 p.

Research output: Contribution to journalArticle

Heterogeneous networks
Intrusion detection
Computer networks
Internet
100 Citations (Scopus)

Multiparty access control for online social networks: Model and mechanisms

Hu, H., Ahn, G-J. & Jorgensen, J., 2013, In : IEEE Transactions on Knowledge and Data Engineering. 25, 7, p. 1614-1627 14 p., 6193103.

Research output: Contribution to journalArticle

Access control
Internet
Specifications
15 Citations (Scopus)

Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy

Zhu, Y., Ahn, G-J., Hu, H., Ma, D. & Wang, S., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 2138-2153 16 p., 6650102.

Research output: Contribution to journalArticle

Access control
Cryptography
Control systems

Special track on smart grid and smart technologies

Ahn, G-J. & Shin, D., 2013, In : Unknown Journal. p. 651 1 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Visualization-based policy analysis for SELinux: Framework and user study

Xu, W., Shehab, M. & Ahn, G-J., Jun 2013, In : International Journal of Information Security. 12, 3, p. 155-171 17 p.

Research output: Contribution to journalArticle

Visualization
Query languages
2012
32 Citations (Scopus)

Access control for online social networks third party applications

Shehab, M., Squicciarini, A., Ahn, G-J. & Kokkinou, I., Nov 2012, In : Computers and Security. 31, 8, p. 897-911 15 p.

Research output: Contribution to journalArticle

Access control
social network
privacy
Finite automata
interaction
13 Citations (Scopus)

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL

Sohr, K., Kuhlmann, M., Gogolla, M., Hu, H. & Ahn, G-J., Dec 2012, In : Information and Software Technology. 54, 12, p. 1396-1417 22 p.

Research output: Contribution to journalArticle

Access control
Specifications
Industry
247 Citations (Scopus)

Cooperative provable data possession for integrity verification in multicloud storage

Zhu, Y., Hu, H., Ahn, G-J. & Yu, M., 2012, In : IEEE Transactions on Parallel and Distributed Systems. 23, 12, p. 2231-2244 14 p., 6152093.

Research output: Contribution to journalArticle

Outsourcing
Scalability
Communication
Costs
Experiments
81 Citations (Scopus)

Detecting and resolving firewall policy anomalies

Hu, H., Ahn, G-J. & Kulkarni, K., 2012, In : IEEE Transactions on Dependable and Secure Computing. 9, 3, p. 318-331 14 p., 6143955.

Research output: Contribution to journalArticle

Industry
Service oriented architecture (SOA)
Cloud computing
Visualization
Experiments
64 Citations (Scopus)

Efficient audit service outsourcing for data integrity in clouds

Zhu, Y., Hu, H., Ahn, G-J. & Yau, S-S., May 2012, In : Journal of Systems and Software. 85, 5, p. 1083-1095 13 p.

Research output: Contribution to journalArticle

Outsourcing
Storage management
Cloud computing
Costs
Servers
6 Citations (Scopus)

Efficient construction of provably secure steganography under ordinary covert channels

Zhu, Y., Yu, M. Y., Hu, H. X., Ahn, G-J. & Zhao, H. J., Jul 2012, In : Science China Information Sciences. 55, 7, p. 1639-1649 11 p.

Research output: Contribution to journalArticle

Steganography
Sampling
Cryptography
3 Citations (Scopus)

Enhancing directory virtualization to detect insider activity

Claycomb, W., Shin, D. & Ahn, G-J., Aug 2012, In : Security and Communication Networks. 5, 8, p. 873-886 14 p.

Research output: Contribution to journalArticle

Security of data
Access control
Authentication
Engines
Monitoring
1 Citation (Scopus)

Policy-driven role-based access management for ad-hoc collaboration

Ahn, G-J., Jin, J. & Shehab, M., 2012, In : Journal of Computer Security. 20, 2-3, p. 223-257 35 p.

Research output: Contribution to journalArticle

Access control
Law enforcement
19 Citations (Scopus)

Remote attestation with domain-based integrity model and policy analysis

Xu, W., Zhang, X., Hu, H., Ahn, G-J. & Seifert, J. P., 2012, In : IEEE Transactions on Dependable and Secure Computing. 9, 3, p. 429-442 14 p., 6104065.

Research output: Contribution to journalArticle

Dynamical systems
Information systems
Semantics
32 Citations (Scopus)

Risk-aware mitigation for MANET routing attacks

Zhao, Z., Hu, H., Ahn, G-J. & Wu, R., 2012, In : IEEE Transactions on Dependable and Secure Computing. 9, 2, p. 250-260 11 p., 6035723.

Research output: Contribution to journalArticle

Network routing
Mobile ad hoc networks
Experiments
14 Citations (Scopus)

Secure collaborative integrity verification for hybrid cloud environments

Zhu, Y., Wang, S., Hu, H., Ahn, G-J. & Ma, D., Sep 2012, In : International Journal of Cooperative Information Systems. 21, 3, p. 165-197 33 p.

Research output: Contribution to journalArticle

Outsourcing
Cloud computing
Communication
Experiments
2011

Assured resource sharing in Grid environments

Jin, J. & Ahn, G-J., May 2011, In : International Journal of Information and Computer Security. 4, 3, p. 215-233 19 p.

Research output: Contribution to journalArticle

Access control
39 Citations (Scopus)

Patient-centric authorization framework for electronic healthcare services

Jin, J., Ahn, G-J., Hu, H., Covington, M. J. & Zhang, X., Mar 2011, In : Computers and Security. 30, 2-3, p. 116-127 12 p.

Research output: Contribution to journalArticle

authorization
Access control
Health
electronics
health
16 Citations (Scopus)

Provably secure role-based encryption with revocation mechanism

Zhu, Y., Hu, H. X., Ahn, G-J., Wang, H. X. & Wang, S. B., Jul 2011, In : Journal of Computer Science and Technology. 26, 4

Research output: Contribution to journalArticle

Revocation
Encryption
Cryptography
Access control
Joining
24 Citations (Scopus)

Security and privacy in social networks

Ahn, G-J., Shehab, M. & Squicciarini, A., May 2011, In : IEEE Internet Computing. 15, 3, p. 10-12 3 p., 5755600.

Research output: Contribution to journalArticle

Network security
Internet
Communication
30 Citations (Scopus)

Zero-knowledge proofs of retrievability

Zhu, Y., Wang, H., Hu, Z., Ahn, G-J. & Hu, H., Aug 2011, In : Science China Information Sciences. 54, 8, p. 1608-1617 10 p.

Research output: Contribution to journalArticle

Network protocols
Communication
2010
5 Citations (Scopus)

Constructing authorization systems using assurance management framework

Hu, H. & Ahn, G-J., Jul 2010, In : IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 40, 4, p. 396-405 10 p., 5462923.

Research output: Contribution to journalArticle

Life cycle
Software engineering
Codes (standards)
Specifications
Testing

Proceedings of the ACM Conference on Computer and Communications Security: Foreword

Sager, T., Ahn, G-J., Kant, K. & Lipford, H., 2010, In : Unknown Journal.

Research output: Contribution to journalArticle

Security of data
Secure communication
708 Citations (Scopus)

Security and privacy challenges in cloud computing environments

Takabi, H., Joshi, J. B. D. & Ahn, G-J., Nov 2010, In : IEEE Security and Privacy. 8, 6, p. 24-31 8 p., 5655240.

Research output: Contribution to journalArticle

Cloud computing
privacy
Momentum
paradigm
present
2009
15 Citations (Scopus)

Security-Enhanced OSGi service environments

Ahn, G-J., Hu, H. & Jin, J., 2009, In : IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 39, 5, p. 562-571 10 p.

Research output: Contribution to journalArticle

Access control
Home networks
Local area networks
2008

Access control management for SCADA systems

Hong, S. P., Ahn, G-J. & Xu, W., Oct 2008, In : IEICE Transactions on Information and Systems. E91-D, 10, p. 2449-2457 9 p.

Research output: Contribution to journalArticle

SCADA systems
Access control
Critical infrastructures
Information technology
Industry
42 Citations (Scopus)

Analyzing and managing role-based access control policies

Sohr, K., Drouineaud, M., Ahn, G-J. & Gogolla, M., Jul 2008, In : IEEE Transactions on Knowledge and Data Engineering. 20, 7, p. 924-939 16 p., 4441714.

Research output: Contribution to journalArticle

Access control
Specifications
Temporal logic
Industry
Computer systems

The 2nd International Workshop on Web and Pervasive Security (WPS 2008)

Yang, L. T., Cao, J., Kim, T. H., Park, J. H., Hsu, C. H., Ahn, G-J., Zou, D., Lai, K. K. & Ouksel, A. M., 2008, In : Unknown Journal. 4517365.

Research output: Contribution to journalArticle

2007
10 Citations (Scopus)

Certification process artifacts defined as measurable units for software assurance

Lee, S. W., Gandhi, R. A. & Ahn, G-J., Mar 2007, In : Software Process Improvement and Practice. 12, 2, p. 165-189 25 p.

Research output: Contribution to journalArticle

Accreditation
Information technology
Computer systems
System of systems
1 Citation (Scopus)
Access control
Artificial Intelligence
Bioinformatics
Computational Biology
Computer science
Artificial intelligence