Gail-Joon Ahn
Gail-Joon Ahn
Dirección de correo verificada de asu.edu
Título
Citado por
Citado por
Año
Security and privacy challenges in cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
IEEE Security & Privacy 8 (6), 24-31, 2010
15322010
Role-based authorization constraints specification
GJ Ahn, R Sandhu
ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000
5992000
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012
5062012
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong
ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005
4362005
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, BT Chu
ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003
4282003
Role-based access control on the web
JS Park, R Sandhu, GJ Ahn
ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001
3812001
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM Symposium on Applied Computing, 1550-1557, 2011
3002011
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE Transactions on Services Computing 6 (2), 227-238, 2011
2912011
FLOWGUARD: building robust firewalls for software-defined networks
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of the third workshop on Hot topics in software defined …, 2014
2702014
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1614-1627, 2012
2122012
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks
T Shu, S Cui, M Krunz
IEEE Globecom 2006, 1-5, 2006
183*2006
The RSL99 language for role-based separation of duty constraints
GJ Ahn, R Sandhu
Proceedings of the fourth ACM workshop on Role-based access control, 43-54, 1999
1811999
Securecloud: Towards a comprehensive security framework for cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
1752010
Policy-driven security management for fog computing: Preliminary framework and a case study
C Dsouza, GJ Ahn, M Taguinod
Proceedings of the 2014 IEEE 15th international conference on information …, 2014
1732014
A role-based delegation framework for healthcare information systems
L Zhang, GJ Ahn, BT Chu
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1702002
Detecting and resolving firewall policy anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012
1672012
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1632010
Injecting RBAC to secure a web-based workflow system
GJ Ahn, R Sandhu, M Kang, J Park
Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000
1552000
Deep android malware detection
N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ...
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
1372017
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
H Hu, GJ Ahn, J Jorgensen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
1262011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20