| 2008 |
| 65 | EE | Mizuho Iwaihara,
Kohei Murakami,
Gail-Joon Ahn,
Masatoshi Yoshikawa:
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology.
ER 2008: 183-198 |
| 64 | EE | Mohamed Shehab,
Anna Cinzia Squicciarini,
Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks.
ICICS 2008: 174-189 |
| 63 | EE | Gail-Joon Ahn,
Wenjuan Xu,
Xinwen Zhang:
Systematic Policy Analysis for High-Assurance Services in SELinux.
POLICY 2008: 3-10 |
| 62 | EE | Wenjuan Xu,
Mohamed Shehab,
Gail-Joon Ahn:
Visualization based policy analysis: case study in SELinux.
SACMAT 2008: 165-174 |
| 61 | EE | Hongxin Hu,
Gail-Joon Ahn:
Enabling verification and conformance testing for access control model.
SACMAT 2008: 195-204 |
| 60 | EE | Gail-Joon Ahn,
Moonam Ko,
Mohamed Shehab:
Portable User-Centric Identity Management.
SEC 2008: 573-587 |
| 59 | EE | Karsten Sohr,
Michael Drouineaud,
Gail-Joon Ahn,
Martin Gogolla:
Analyzing and Managing Role-Based Access Control Policies.
IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008) |
| 2007 |
| 58 | | Steve Barker,
Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings
Springer 2007 |
| 57 | EE | Bei-tseng Chu,
Gail-Joon Ahn,
Steven Blanchard,
James Deese,
Richard Kelly,
Huiming Yu,
Ashika Young:
Collegiate Cyber Game Design Criteria and Participation.
ACIS-ICIS 2007: 1036-1041 |
| 56 | EE | Lawrence Teo,
Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework.
ASIACCS 2007: 362-364 |
| 55 | EE | Gail-Joon Ahn,
Moonam Ko:
User-centric privacy management for federated identity management.
CollaborateCom 2007: 187-195 |
| 54 | EE | Jing Jin,
Gail-Joon Ahn,
Mohamed Shehab,
Hongxin Hu:
Towards trust-aware access management for ad-hoc collaborations.
CollaborateCom 2007: 41-48 |
| 53 | EE | Napoleon Paxton,
Gail-Joon Ahn,
Bill Chu:
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
IRI 2007: 73-78 |
| 52 | EE | Gail-Joon Ahn,
Dhruv Gami:
Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux.
ISCC 2007: 865-870 |
| 51 | EE | Lawrence Teo,
Gail-Joon Ahn:
Towards Effective Security Policy Management for Heterogeneous Network Environments.
POLICY 2007: 241-245 |
| 50 | EE | Gail-Joon Ahn,
Hongxin Hu:
Towards realizing a formal RBAC model in real systems.
SACMAT 2007: 215-224 |
| 49 | EE | Gail-Joon Ahn:
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
| 48 | EE | Gail-Joon Ahn,
Badrinath Mohan,
Seng-Phil Hong:
Towards secure information sharing using role-based delegation.
J. Network and Computer Applications 30(1): 42-59 (2007) |
| 47 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn:
Certification process artifacts defined as measurable units for software assurance.
Software Process: Improvement and Practice 12(2): 165-189 (2007) |
| 2006 |
| 46 | EE | Jing Jin,
Gail-Joon Ahn,
Mukesh Singhal:
ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing.
EDBT Workshops 2006: 724-740 |
| 45 | EE | Jing Jin,
Gail-Joon Ahn:
Role-based access management for ad-hoc collaborative sharing.
SACMAT 2006: 200-209 |
| 44 | EE | Seok Won Lee,
Divya Muthurajan,
Robin A. Gandhi,
Deepak S. Yavagal,
Gail-Joon Ahn:
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
International Journal of Software Engineering and Knowledge Engineering 16(6): 851-884 (2006) |
| 2005 |
| 43 | | Elena Ferrari,
Gail-Joon Ahn:
SACMAT 2005, 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005, Proceedings
ACM 2005 |
| 42 | EE | Deepak S. Yavagal,
Seok Won Lee,
Gail-Joon Ahn,
Robin A. Gandhi:
Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
ACM Southeast Regional Conference (2) 2005: 130-135 |
| 41 | EE | Lawrence Teo,
Gail-Joon Ahn:
Supporting access control policies across multiple operating systems.
ACM Southeast Regional Conference (2) 2005: 288-293 |
| 40 | EE | Gail-Joon Ahn,
John Lam:
Managing privacy preferences for federated identity management.
Digital Identity Management 2005: 28-36 |
| 39 | EE | Karsten Sohr,
Gail-Joon Ahn,
Martin Gogolla,
Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL.
ESORICS 2005: 64-79 |
| 38 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn,
Deepak S. Yavagal:
Active Automation of the DITSCAP.
ISI 2005: 479-485 |
| 37 | EE | Karsten Sohr,
Michael Drouineaud,
Gail-Joon Ahn:
Formal specification of role-based security policies for clinical information systems.
SAC 2005: 332-339 |
| 36 | EE | William J. Tolone,
Gail-Joon Ahn,
Tanusree Pai,
Seng-Phil Hong:
Access control in collaborative systems.
ACM Comput. Surv. 37(1): 29-41 (2005) |
| 35 | EE | Karsten Sohr,
Gail-Joon Ahn,
Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
| 34 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
| 33 | | Dongwan Shin,
Gail-Joon Ahn:
Role-based privilege and trust management.
Comput. Syst. Sci. Eng. 20(6): (2005) |
| 2004 |
| 32 | EE | Joshua Foster,
Kalpathi R. Subramanian,
Robert Herring,
Gail-Joon Ahn:
Interactive Exploration of the AFS File System.
INFOVIS 2004 |
| 31 | | Dongwan Shin,
Gail-Joon Ahn:
Role-based Trust Assignment in Trust Management Systems.
ISCA PDCS 2004: 551-558 |
| 30 | EE | Gail-Joon Ahn,
Badrinath Mohan:
Secure Information Sharing Using Role-based Delegation.
ITCC (2) 2004: 810-819 |
| 29 | EE | Lawrence Teo,
Yu-An Sun,
Gail-Joon Ahn:
Defeating Internet Attacks Using Risk Awareness and Active Honeypots.
IWIA 2004: 155-168 |
| 28 | EE | Gail-Joon Ahn,
Dongwan Shin,
Longhua Zhang:
Role-Based Privilege Management Using Attribute Certificates and Delegation.
TrustBus 2004: 100-109 |
| 27 | EE | Gail-Joon Ahn,
Dongwan Shin,
Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues.
WISE 2004: 78-89 |
| 26 | | Gail-Joon Ahn,
Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux.
WOSIS 2004: 13-22 |
| 25 | EE | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
A role-based infrastructure management system: design and implementation.
Concurrency - Practice and Experience 16(11): 1121-1141 (2004) |
| 2003 |
| 24 | EE | Lawrence Teo,
Yuliang Zheng,
Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection.
IWIA 2003: 73-88 |
| 23 | | Gail-Joon Ahn,
Badrinath Mohan:
Role-Based Authorization in Decentralized Health Care Environments.
SAC 2003: 251-256 |
| 22 | | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
SAC 2003: 325-330 |
| 21 | EE | David F. Ferraiolo,
Ramaswamy Chandramouli,
Gail-Joon Ahn,
Serban I. Gavrila:
The role control center: features and case studies.
SACMAT 2003: 12-20 |
| 20 | EE | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
On modeling system-centric information for role engineering.
SACMAT 2003: 169-178 |
| 19 | EE | Lawrence Teo,
Gail-Joon Ahn,
Yuliang Zheng:
Dynamic and risk-aware network access management.
SACMAT 2003: 217-230 |
| 18 | | Longhua Zhang,
Gail-Joon Ahn:
Constrained Role-based Delegation.
SEC 2003: 289-300 |
| 17 | EE | Gail-Joon Ahn:
Specification and Classification of Role-based Authorization Policies.
WETICE 2003: 202-207 |
| 16 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation.
ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003) |
| 2002 |
| 15 | EE | Dongwan Shin,
Gail-Joon Ahn,
Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
COMPSAC 2002: 934-939 |
| 14 | | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM.
DBSec 2002: 49-60 |
| 13 | | William J. Tolone,
Bei-tseng Chu,
Gail-Joon Ahn,
Robert G. Wilhelm,
John E. Sims:
Challenges to Multi-Enterprise Integration.
ICEIMT 2002: 205-216 |
| 12 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A role-based delegation framework for healthcare information systems.
SACMAT 2002: 125-134 |
| 11 | EE | Gail-Joon Ahn,
Dongwan Shin:
Towards Scalable Authentication in Health Services.
WETICE 2002: 83-88 |
| 10 | | Gail-Joon Ahn,
Seng-Phil Hong,
Michael E. Shin:
Reconstructing a formal security model.
Information & Software Technology 44(11): 649-657 (2002) |
| 2001 |
| 9 | | Joon S. Park,
Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP.
DBSec 2001: 19-30 |
| 8 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A rule-based framework for role based delegation.
SACMAT 2001: 153-162 |
| 7 | EE | Gail-Joon Ahn,
Michael E. Shin:
Role-Based Authorization Constraints Specification Using Object Constraint Language.
WETICE 2001: 157-162 |
| 6 | EE | Joon S. Park,
Ravi S. Sandhu,
Gail-Joon Ahn:
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) |
| 5 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Decentralized user group assignment in Windows NT.
Journal of Systems and Software 56(1): 39-49 (2001) |
| 2000 |
| 4 | EE | Gail-Joon Ahn,
Ravi S. Sandhu,
Myong H. Kang,
Joon S. Park:
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control 2000: 1-10 |
| 3 | EE | Michael E. Shin,
Gail-Joon Ahn:
UML-Based Representation of Role-Based Access Control.
WETICE 2000: 195-200 |
| 2 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based authorization constraints specification.
ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) |
| 1999 |
| 1 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
The RSL99 Language for Role-Based Separation of Duty Constraints.
ACM Workshop on Role-Based Access Control 1999: 43-54 |