If you made any changes in Pure, your changes will be visible here soon.

Research Output 1999 2019

Filter
Article
10 Citations (Scopus)

Towards secure information sharing using role-based delegation

Ahn, G-J., Mohan, B. & Hong, S. P., Jan 2007, In : Journal of Network and Computer Applications. 30, 1, p. 42-59 18 p.

Research output: Contribution to journalArticle

Ubiquitous computing
Personnel
2006
27 Citations (Scopus)

Building decision support problem domain ontology from natural language requirements for software assurance

Lee, S. W., Muthurajan, D., Gandhi, R. A., Yavagal, D. & Ahn, G-J., Dec 2006, In : International Journal of Software Engineering and Knowledge Engineering. 16, 6, p. 851-884 34 p.

Research output: Contribution to journalArticle

Requirements engineering
Ontology
Decision making
Knowledge engineering
Accreditation
2005
211 Citations (Scopus)

Access control in collaborative systems

Tolone, W., Ahn, G-J., Pai, T. & Hong, S. P., Mar 2005, In : ACM Computing Surveys. 37, 1, p. 29-41 13 p.

Research output: Contribution to journalArticle

Collaborative Systems
Access Control
Access control
Information Security
Confidentiality

Editorial message: Special track on computer security

Bella, G., Ryan, P. Y. A., Ahn, G-J., Brömme, A., Chadwick, D. W., Christianson, B., Durgin, N., Foley, S., Fournet, C., Gollmann, D., Gritzalis, S., Honeyman, P., Katsikas, S. K., Kuhn, M., Mantel, H., Mitchell, C., Von Oheimb, D., Samarati, P., Shmatikov, V. & Tan, K., 2005, In : Unknown Journal. 1, p. 304-305 2 p.

Research output: Contribution to journalArticle

Security of data

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT: Foreword

Ferrari, E. & Ahn, G-J., 2005, In : Unknown Journal.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Role-based privilege and trust management

Shin, D. & Ahn, G-J., Nov 2005, In : Computer Systems Science and Engineering. 20, 6, p. 401-410 10 p.

Research output: Contribution to journalArticle

Trust Management
Authorization
Internet
Unknown
Trust Model
2004
4 Citations (Scopus)

A role-based infrastructure management system: Design and implementation

Shin, D., Ahn, G-J., Cho, S. & Jin, S., Sep 2004, In : Concurrency Computation Practice and Experience. 16, 11, p. 1121-1141 21 p.

Research output: Contribution to journalArticle

Access control
System Design
Infrastructure
Systems analysis
Role-based Access Control
8 Citations (Scopus)
Identity Management
Internet
Experimentation
Federation
Requirements
1 Citation (Scopus)
Business Rules
Delegation
Authorization
Certificate
Internet
2003
159 Citations (Scopus)

A Rule-Based Framework for Role-Based Delegation and Revocation

Zhang, L., Ahn, G-J. & Chu, B. T., Aug 1 2003, In : ACM Transactions on Information and System Security. 6, 3, p. 404-441 38 p.

Research output: Contribution to journalArticle

Law enforcement
2002
3 Citations (Scopus)

Reconstructing a formal security model

Ahn, G-J., Hong, S. P. & Shin, M. E., Aug 15 2002, In : Information and Software Technology. 44, 11, p. 649-657 9 p.

Research output: Contribution to journalArticle

Access control
Unified Modeling Language
Software engineering
Specification languages
Engineers
2001

CONUGA: Constrained user-group assignment

Ahn, G-J. & Kim, K., Apr 2001, In : Journal of Network and Computer Applications. 24, 2, p. 87-100 14 p.

Research output: Contribution to journalArticle

Access control
3 Citations (Scopus)

Decentralized user group assignment in Windows NT

Ahn, G-J. & Sandhu, R., Feb 1 2001, In : Journal of Systems and Software. 56, 1, p. 39-49 11 p.

Research output: Contribution to journalArticle

Access control
Large scale systems
Experiments
152 Citations (Scopus)

Role-Based Access Control on the Web

Park, J. S., Sandhu, R. & Ahn, G-J., 2001, In : ACM Transactions on Information and System Security. 4, 1, p. 37-71 35 p.

Research output: Contribution to journalArticle

Access control
Servers
Industry
2000
11 Citations (Scopus)

Role-based access control in DCOM

Ahn, G-J., Nov 2000, In : Journal of Systems Architecture. 46, 13, p. 1175-1184 10 p.

Research output: Contribution to journalArticle

Access control
Software architecture
HIgh speed networks
Online systems
Distributed computer systems
312 Citations (Scopus)

Role-Based Authorization Constraints Specification

Ahn, G-J. & Sandhu, R., Nov 1 2000, In : ACM Transactions on Information and System Security. 3, 4, p. 207-226 20 p.

Research output: Contribution to journalArticle

Access control
Specifications
Formal languages
Semantics
1999

Adopting roles in network information services

Ahn, G-J., 1999, In : International Journal of Computers and Applications. 21, 3, p. 100-104 5 p.

Research output: Contribution to journalArticle

Information services
Network protocols
4 Citations (Scopus)

Towards role-based administration in network information services

Ahn, G-J. & Sandhu, R., Jul 1999, In : Journal of Network and Computer Applications. 22, 3, p. 199-213 15 p.

Research output: Contribution to journalArticle

Information services
Servers
Network protocols