Gail-Joon Ahn
Gail-Joon Ahn
Verified email at asu.edu
TitleCited byYear
Security and privacy challenges in cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
IEEE Security & Privacy 8 (6), 24-31, 2010
14212010
Role-based authorization constraints specification
GJ Ahn, R Sandhu
ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000
5962000
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012
4792012
A rule-based framework for role-based delegation and revocation
L Zhang, GJ Ahn, GJ Ahn, GJ Ahn, GJ Ahn, BT Chu
ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003
4632003
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong
ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005
4162005
Role-based access control on the web
JS Park, R Sandhu, GJ Ahn
ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001
3762001
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM Symposium on Applied Computing, 1550-1557, 2011
2922011
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE Transactions on Services Computing 6 (2), 227-238, 2011
2802011
FLOWGUARD: building robust firewalls for software-defined networks
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of the third workshop on Hot topics in software defined …, 2014
2452014
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1614-1627, 2012
1992012
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks
T Shu, S Cui, M Krunz
IEEE Globecom 2006, 1-5, 2006
178*2006
The RSL99 Language for Role-Based Separation of Duty Constraints.
GJ Ahn, RS Sandhu
ACM Workshop on Role-Based Access Control, 43-54, 1999
1781999
Detecting and resolving firewall policy anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012
1652012
Securecloud: Towards a comprehensive security framework for cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
1652010
A role-based delegation framework for healthcare information systems
L Zhang, GJ Ahn, BT Chu
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1632002
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1572010
Injecting RBAC to secure a Web-based workflow system
GJ Ahn, R Sandhu, M Kang, J Park
Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000
1522000
Policy-driven security management for fog computing: Preliminary framework and a case study
C Dsouza, GJ Ahn, M Taguinod
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
1402014
Efficient audit service outsourcing for data integrity in clouds
Y Zhu, H Hu, GJ Ahn, SS Yau
Journal of Systems and Software 85 (5), 1083-1095, 2012
1202012
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
H Hu, GJ Ahn, J Jorgensen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
1202011
The system can't perform the operation now. Try again later.
Articles 1–20