2008 |
65 | EE | Mizuho Iwaihara,
Kohei Murakami,
Gail-Joon Ahn,
Masatoshi Yoshikawa:
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology.
ER 2008: 183-198 |
64 | EE | Mohamed Shehab,
Anna Cinzia Squicciarini,
Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks.
ICICS 2008: 174-189 |
63 | EE | Gail-Joon Ahn,
Wenjuan Xu,
Xinwen Zhang:
Systematic Policy Analysis for High-Assurance Services in SELinux.
POLICY 2008: 3-10 |
62 | EE | Wenjuan Xu,
Mohamed Shehab,
Gail-Joon Ahn:
Visualization based policy analysis: case study in SELinux.
SACMAT 2008: 165-174 |
61 | EE | Hongxin Hu,
Gail-Joon Ahn:
Enabling verification and conformance testing for access control model.
SACMAT 2008: 195-204 |
60 | EE | Gail-Joon Ahn,
Moonam Ko,
Mohamed Shehab:
Portable User-Centric Identity Management.
SEC 2008: 573-587 |
59 | EE | Karsten Sohr,
Michael Drouineaud,
Gail-Joon Ahn,
Martin Gogolla:
Analyzing and Managing Role-Based Access Control Policies.
IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008) |
2007 |
58 | | Steve Barker,
Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings
Springer 2007 |
57 | EE | Bei-tseng Chu,
Gail-Joon Ahn,
Steven Blanchard,
James Deese,
Richard Kelly,
Huiming Yu,
Ashika Young:
Collegiate Cyber Game Design Criteria and Participation.
ACIS-ICIS 2007: 1036-1041 |
56 | EE | Lawrence Teo,
Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework.
ASIACCS 2007: 362-364 |
55 | EE | Gail-Joon Ahn,
Moonam Ko:
User-centric privacy management for federated identity management.
CollaborateCom 2007: 187-195 |
54 | EE | Jing Jin,
Gail-Joon Ahn,
Mohamed Shehab,
Hongxin Hu:
Towards trust-aware access management for ad-hoc collaborations.
CollaborateCom 2007: 41-48 |
53 | EE | Napoleon Paxton,
Gail-Joon Ahn,
Bill Chu:
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
IRI 2007: 73-78 |
52 | EE | Gail-Joon Ahn,
Dhruv Gami:
Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux.
ISCC 2007: 865-870 |
51 | EE | Lawrence Teo,
Gail-Joon Ahn:
Towards Effective Security Policy Management for Heterogeneous Network Environments.
POLICY 2007: 241-245 |
50 | EE | Gail-Joon Ahn,
Hongxin Hu:
Towards realizing a formal RBAC model in real systems.
SACMAT 2007: 215-224 |
49 | EE | Gail-Joon Ahn:
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
48 | EE | Gail-Joon Ahn,
Badrinath Mohan,
Seng-Phil Hong:
Towards secure information sharing using role-based delegation.
J. Network and Computer Applications 30(1): 42-59 (2007) |
47 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn:
Certification process artifacts defined as measurable units for software assurance.
Software Process: Improvement and Practice 12(2): 165-189 (2007) |
2006 |
46 | EE | Jing Jin,
Gail-Joon Ahn,
Mukesh Singhal:
ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing.
EDBT Workshops 2006: 724-740 |
45 | EE | Jing Jin,
Gail-Joon Ahn:
Role-based access management for ad-hoc collaborative sharing.
SACMAT 2006: 200-209 |
44 | EE | Seok Won Lee,
Divya Muthurajan,
Robin A. Gandhi,
Deepak S. Yavagal,
Gail-Joon Ahn:
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
International Journal of Software Engineering and Knowledge Engineering 16(6): 851-884 (2006) |
2005 |
43 | | Elena Ferrari,
Gail-Joon Ahn:
SACMAT 2005, 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005, Proceedings
ACM 2005 |
42 | EE | Deepak S. Yavagal,
Seok Won Lee,
Gail-Joon Ahn,
Robin A. Gandhi:
Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
ACM Southeast Regional Conference (2) 2005: 130-135 |
41 | EE | Lawrence Teo,
Gail-Joon Ahn:
Supporting access control policies across multiple operating systems.
ACM Southeast Regional Conference (2) 2005: 288-293 |
40 | EE | Gail-Joon Ahn,
John Lam:
Managing privacy preferences for federated identity management.
Digital Identity Management 2005: 28-36 |
39 | EE | Karsten Sohr,
Gail-Joon Ahn,
Martin Gogolla,
Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL.
ESORICS 2005: 64-79 |
38 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn,
Deepak S. Yavagal:
Active Automation of the DITSCAP.
ISI 2005: 479-485 |
37 | EE | Karsten Sohr,
Michael Drouineaud,
Gail-Joon Ahn:
Formal specification of role-based security policies for clinical information systems.
SAC 2005: 332-339 |
36 | EE | William J. Tolone,
Gail-Joon Ahn,
Tanusree Pai,
Seng-Phil Hong:
Access control in collaborative systems.
ACM Comput. Surv. 37(1): 29-41 (2005) |
35 | EE | Karsten Sohr,
Gail-Joon Ahn,
Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
34 | EE | Seok Won Lee,
Robin A. Gandhi,
Gail-Joon Ahn:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
33 | | Dongwan Shin,
Gail-Joon Ahn:
Role-based privilege and trust management.
Comput. Syst. Sci. Eng. 20(6): (2005) |
2004 |
32 | EE | Joshua Foster,
Kalpathi R. Subramanian,
Robert Herring,
Gail-Joon Ahn:
Interactive Exploration of the AFS File System.
INFOVIS 2004 |
31 | | Dongwan Shin,
Gail-Joon Ahn:
Role-based Trust Assignment in Trust Management Systems.
ISCA PDCS 2004: 551-558 |
30 | EE | Gail-Joon Ahn,
Badrinath Mohan:
Secure Information Sharing Using Role-based Delegation.
ITCC (2) 2004: 810-819 |
29 | EE | Lawrence Teo,
Yu-An Sun,
Gail-Joon Ahn:
Defeating Internet Attacks Using Risk Awareness and Active Honeypots.
IWIA 2004: 155-168 |
28 | EE | Gail-Joon Ahn,
Dongwan Shin,
Longhua Zhang:
Role-Based Privilege Management Using Attribute Certificates and Delegation.
TrustBus 2004: 100-109 |
27 | EE | Gail-Joon Ahn,
Dongwan Shin,
Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues.
WISE 2004: 78-89 |
26 | | Gail-Joon Ahn,
Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux.
WOSIS 2004: 13-22 |
25 | EE | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
A role-based infrastructure management system: design and implementation.
Concurrency - Practice and Experience 16(11): 1121-1141 (2004) |
2003 |
24 | EE | Lawrence Teo,
Yuliang Zheng,
Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection.
IWIA 2003: 73-88 |
23 | | Gail-Joon Ahn,
Badrinath Mohan:
Role-Based Authorization in Decentralized Health Care Environments.
SAC 2003: 251-256 |
22 | | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
SAC 2003: 325-330 |
21 | EE | David F. Ferraiolo,
Ramaswamy Chandramouli,
Gail-Joon Ahn,
Serban I. Gavrila:
The role control center: features and case studies.
SACMAT 2003: 12-20 |
20 | EE | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho,
Seunghun Jin:
On modeling system-centric information for role engineering.
SACMAT 2003: 169-178 |
19 | EE | Lawrence Teo,
Gail-Joon Ahn,
Yuliang Zheng:
Dynamic and risk-aware network access management.
SACMAT 2003: 217-230 |
18 | | Longhua Zhang,
Gail-Joon Ahn:
Constrained Role-based Delegation.
SEC 2003: 289-300 |
17 | EE | Gail-Joon Ahn:
Specification and Classification of Role-based Authorization Policies.
WETICE 2003: 202-207 |
16 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation.
ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003) |
2002 |
15 | EE | Dongwan Shin,
Gail-Joon Ahn,
Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
COMPSAC 2002: 934-939 |
14 | | Dongwan Shin,
Gail-Joon Ahn,
Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM.
DBSec 2002: 49-60 |
13 | | William J. Tolone,
Bei-tseng Chu,
Gail-Joon Ahn,
Robert G. Wilhelm,
John E. Sims:
Challenges to Multi-Enterprise Integration.
ICEIMT 2002: 205-216 |
12 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A role-based delegation framework for healthcare information systems.
SACMAT 2002: 125-134 |
11 | EE | Gail-Joon Ahn,
Dongwan Shin:
Towards Scalable Authentication in Health Services.
WETICE 2002: 83-88 |
10 | | Gail-Joon Ahn,
Seng-Phil Hong,
Michael E. Shin:
Reconstructing a formal security model.
Information & Software Technology 44(11): 649-657 (2002) |
2001 |
9 | | Joon S. Park,
Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP.
DBSec 2001: 19-30 |
8 | EE | Longhua Zhang,
Gail-Joon Ahn,
Bei-tseng Chu:
A rule-based framework for role based delegation.
SACMAT 2001: 153-162 |
7 | EE | Gail-Joon Ahn,
Michael E. Shin:
Role-Based Authorization Constraints Specification Using Object Constraint Language.
WETICE 2001: 157-162 |
6 | EE | Joon S. Park,
Ravi S. Sandhu,
Gail-Joon Ahn:
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) |
5 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Decentralized user group assignment in Windows NT.
Journal of Systems and Software 56(1): 39-49 (2001) |
2000 |
4 | EE | Gail-Joon Ahn,
Ravi S. Sandhu,
Myong H. Kang,
Joon S. Park:
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control 2000: 1-10 |
3 | EE | Michael E. Shin,
Gail-Joon Ahn:
UML-Based Representation of Role-Based Access Control.
WETICE 2000: 195-200 |
2 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based authorization constraints specification.
ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000) |
1999 |
1 | EE | Gail-Joon Ahn,
Ravi S. Sandhu:
The RSL99 Language for Role-Based Separation of Duty Constraints.
ACM Workshop on Role-Based Access Control 1999: 43-54 |