Gail-Joon Ahn

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

65EEMizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa: Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. ER 2008: 183-198
64EEMohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn: Beyond User-to-User Access Control for Online Social Networks. ICICS 2008: 174-189
63EEGail-Joon Ahn, Wenjuan Xu, Xinwen Zhang: Systematic Policy Analysis for High-Assurance Services in SELinux. POLICY 2008: 3-10
62EEWenjuan Xu, Mohamed Shehab, Gail-Joon Ahn: Visualization based policy analysis: case study in SELinux. SACMAT 2008: 165-174
61EEHongxin Hu, Gail-Joon Ahn: Enabling verification and conformance testing for access control model. SACMAT 2008: 195-204
60EEGail-Joon Ahn, Moonam Ko, Mohamed Shehab: Portable User-Centric Identity Management. SEC 2008: 573-587
59EEKarsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla: Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008)
58 Steve Barker, Gail-Joon Ahn: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings Springer 2007
57EEBei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young: Collegiate Cyber Game Design Criteria and Participation. ACIS-ICIS 2007: 1036-1041
56EELawrence Teo, Gail-Joon Ahn: Managing heterogeneous network environments using an extensible policy framework. ASIACCS 2007: 362-364
55EEGail-Joon Ahn, Moonam Ko: User-centric privacy management for federated identity management. CollaborateCom 2007: 187-195
54EEJing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu: Towards trust-aware access management for ad-hoc collaborations. CollaborateCom 2007: 41-48
53EENapoleon Paxton, Gail-Joon Ahn, Bill Chu: Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. IRI 2007: 73-78
52EEGail-Joon Ahn, Dhruv Gami: Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. ISCC 2007: 865-870
51EELawrence Teo, Gail-Joon Ahn: Towards Effective Security Policy Management for Heterogeneous Network Environments. POLICY 2007: 241-245
50EEGail-Joon Ahn, Hongxin Hu: Towards realizing a formal RBAC model in real systems. SACMAT 2007: 215-224
49EEGail-Joon Ahn: Guest editorial: Special issue on access control models and technologies. ACM Trans. Inf. Syst. Secur. 10(1): (2007)
48EEGail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong: Towards secure information sharing using role-based delegation. J. Network and Computer Applications 30(1): 42-59 (2007)
47EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn: Certification process artifacts defined as measurable units for software assurance. Software Process: Improvement and Practice 12(2): 165-189 (2007)
46EEJing Jin, Gail-Joon Ahn, Mukesh Singhal: ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. EDBT Workshops 2006: 724-740
45EEJing Jin, Gail-Joon Ahn: Role-based access management for ad-hoc collaborative sharing. SACMAT 2006: 200-209
44EESeok Won Lee, Divya Muthurajan, Robin A. Gandhi, Deepak S. Yavagal, Gail-Joon Ahn: Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance. International Journal of Software Engineering and Knowledge Engineering 16(6): 851-884 (2006)
43 Elena Ferrari, Gail-Joon Ahn: SACMAT 2005, 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005, Proceedings ACM 2005
42EEDeepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi: Common criteria requirements modeling and its uses for quality of information assurance (QoIA). ACM Southeast Regional Conference (2) 2005: 130-135
41EELawrence Teo, Gail-Joon Ahn: Supporting access control policies across multiple operating systems. ACM Southeast Regional Conference (2) 2005: 288-293
40EEGail-Joon Ahn, John Lam: Managing privacy preferences for federated identity management. Digital Identity Management 2005: 28-36
39EEKarsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge: Specification and Validation of Authorisation Constraints Using UML and OCL. ESORICS 2005: 64-79
38EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal: Active Automation of the DITSCAP. ISI 2005: 479-485
37EEKarsten Sohr, Michael Drouineaud, Gail-Joon Ahn: Formal specification of role-based security policies for clinical information systems. SAC 2005: 332-339
36EEWilliam J. Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong: Access control in collaborative systems. ACM Comput. Surv. 37(1): 29-41 (2005)
35EEKarsten Sohr, Gail-Joon Ahn, Lars Migge: Articulating and enforcing authorisation policies with UML and OCL. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
34EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn: Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
33 Dongwan Shin, Gail-Joon Ahn: Role-based privilege and trust management. Comput. Syst. Sci. Eng. 20(6): (2005)
32EEJoshua Foster, Kalpathi R. Subramanian, Robert Herring, Gail-Joon Ahn: Interactive Exploration of the AFS File System. INFOVIS 2004
31 Dongwan Shin, Gail-Joon Ahn: Role-based Trust Assignment in Trust Management Systems. ISCA PDCS 2004: 551-558
30EEGail-Joon Ahn, Badrinath Mohan: Secure Information Sharing Using Role-based Delegation. ITCC (2) 2004: 810-819
29EELawrence Teo, Yu-An Sun, Gail-Joon Ahn: Defeating Internet Attacks Using Risk Awareness and Active Honeypots. IWIA 2004: 155-168
28EEGail-Joon Ahn, Dongwan Shin, Longhua Zhang: Role-Based Privilege Management Using Attribute Certificates and Delegation. TrustBus 2004: 100-109
27EEGail-Joon Ahn, Dongwan Shin, Seng-Phil Hong: Information Assurance in Federated Identity Management: Experimentations and Issues. WISE 2004: 78-89
26 Gail-Joon Ahn, Seng-Phil Hong: Group Hierarchies with Constrained User Assignment in Linux. WOSIS 2004: 13-22
25EEDongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: A role-based infrastructure management system: design and implementation. Concurrency - Practice and Experience 16(11): 1121-1141 (2004)
24EELawrence Teo, Yuliang Zheng, Gail-Joon Ahn: Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88
23 Gail-Joon Ahn, Badrinath Mohan: Role-Based Authorization in Decentralized Health Care Environments. SAC 2003: 251-256
22 Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation. SAC 2003: 325-330
21EEDavid F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila: The role control center: features and case studies. SACMAT 2003: 12-20
20EEDongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: On modeling system-centric information for role engineering. SACMAT 2003: 169-178
19EELawrence Teo, Gail-Joon Ahn, Yuliang Zheng: Dynamic and risk-aware network access management. SACMAT 2003: 217-230
18 Longhua Zhang, Gail-Joon Ahn: Constrained Role-based Delegation. SEC 2003: 289-300
17EEGail-Joon Ahn: Specification and Classification of Role-based Authorization Policies. WETICE 2003: 202-207
16EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003)
15EEDongwan Shin, Gail-Joon Ahn, Joon S. Park: An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939
14 Dongwan Shin, Gail-Joon Ahn, Sangrae Cho: Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60
13 William J. Tolone, Bei-tseng Chu, Gail-Joon Ahn, Robert G. Wilhelm, John E. Sims: Challenges to Multi-Enterprise Integration. ICEIMT 2002: 205-216
12EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A role-based delegation framework for healthcare information systems. SACMAT 2002: 125-134
11EEGail-Joon Ahn, Dongwan Shin: Towards Scalable Authentication in Health Services. WETICE 2002: 83-88
10 Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin: Reconstructing a formal security model. Information & Software Technology 44(11): 649-657 (2002)
9 Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30
8EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A rule-based framework for role based delegation. SACMAT 2001: 153-162
7EEGail-Joon Ahn, Michael E. Shin: Role-Based Authorization Constraints Specification Using Object Constraint Language. WETICE 2001: 157-162
6EEJoon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001)
5EEGail-Joon Ahn, Ravi S. Sandhu: Decentralized user group assignment in Windows NT. Journal of Systems and Software 56(1): 39-49 (2001)
4EEGail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10
3EEMichael E. Shin, Gail-Joon Ahn: UML-Based Representation of Role-Based Access Control. WETICE 2000: 195-200
2EEGail-Joon Ahn, Ravi S. Sandhu: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000)
1EEGail-Joon Ahn, Ravi S. Sandhu: The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54

Coauthor Index

1Steve Barker [58]
2Steven Blanchard [57]
3Ramaswamy Chandramouli [21]
4Sangrae Cho [14] [20] [22] [25]
5Bei-tseng Chu [8] [12] [13] [16] [57]
6Bill Chu [53]
7James Deese [57]
8Michael Drouineaud [37] [59]
9David F. Ferraiolo [21]
10Elena Ferrari [43]
11Joshua Foster [32]
12Dhruv Gami [52]
13Robin A. Gandhi [34] [38] [42] [44] [47]
14Serban I. Gavrila [21]
15Martin Gogolla [39] [59]
16Robert Herring [32]
17Seng-Phil Hong [10] [26] [27] [36] [48]
18Hongxin Hu [50] [54] [61]
19Mizuho Iwaihara [65]
20Jing Jin [45] [46] [54]
21Seunghun Jin [20] [22] [25]
22Myong H. Kang [4]
23Richard Kelly [57]
24Moonam Ko [55] [60]
25John Lam [40]
26Seok Won Lee [34] [38] [42] [44] [47]
27Lars Migge [35] [39]
28Badrinath Mohan [23] [30] [48]
29Kohei Murakami [65]
30Divya Muthurajan [44]
31Tanusree Pai [36]
32Joon S. Park [4] [6] [9] [15]
33Napoleon Paxton [53]
34Ravi S. Sandhu [1] [2] [4] [5] [6] [9]
35Mohamed Shehab [54] [60] [62] [64]
36Dongwan Shin [11] [14] [15] [20] [22] [25] [27] [28] [31] [33]
37Michael Eonsuk Shin (Michael E. Shin) [3] [7] [10]
38John E. Sims [13]
39Mukesh Singhal [46]
40Karsten Sohr [35] [37] [39] [59]
41Anna Cinzia Squicciarini [64]
42Kalpathi R. Subramanian [32]
43Yu-An Sun [29]
44Lawrence Teo [19] [24] [29] [41] [51] [56]
45William J. Tolone [13] [36]
46Robert G. Wilhelm [13]
47Wenjuan Xu [62] [63]
48Deepak S. Yavagal [38] [42] [44]
49Masatoshi Yoshikawa [65]
50Ashika Young [57]
51Huiming Yu [57]
52Longhua Zhang [8] [12] [16] [18] [28]
53Xinwen Zhang [63]
54Yuliang Zheng [19] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)