2007 |
6 | EE | Gail-Joon Ahn,
Badrinath Mohan,
Seng-Phil Hong:
Towards secure information sharing using role-based delegation.
J. Network and Computer Applications 30(1): 42-59 (2007) |
2006 |
5 | EE | Seng-Phil Hong,
Sungmin Kang:
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.
Communications and Multimedia Security 2006: 206-215 |
2005 |
4 | EE | William J. Tolone,
Gail-Joon Ahn,
Tanusree Pai,
Seng-Phil Hong:
Access control in collaborative systems.
ACM Comput. Surv. 37(1): 29-41 (2005) |
2004 |
3 | EE | Gail-Joon Ahn,
Dongwan Shin,
Seng-Phil Hong:
Information Assurance in Federated Identity Management: Experimentations and Issues.
WISE 2004: 78-89 |
2 | | Gail-Joon Ahn,
Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux.
WOSIS 2004: 13-22 |
2002 |
1 | | Gail-Joon Ahn,
Seng-Phil Hong,
Michael E. Shin:
Reconstructing a formal security model.
Information & Software Technology 44(11): 649-657 (2002) |