
Gail-Joon Ahn
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c162]Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c161]Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture. MobiSys 2020: 107-120 - [c160]Carlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. SACMAT 2020: 131-144 - [c159]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c158]Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020 - [e19]Qi Alfred Chen, Ziming Zhao, Gail-Joon Ahn:
AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020. ACM 2020, ISBN 978-1-4503-7113-1 [contents]
2010 – 2019
- 2019
- [j61]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [j60]Gail-Joon Ahn
, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c157]Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. CCS 2019: 1955-1970 - [c156]Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c155]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c154]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - [c153]Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner
, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - [c152]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers:
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. IEEE Symposium on Security and Privacy 2019: 1344-1361 - [c151]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. USENIX Security Symposium 2019: 1327-1340 - [e18]Gail-Joon Ahn, Bhavani M. Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9 [contents] - [e17]Ziming Zhao, Qi Alfred Chen, Gail-Joon Ahn:
Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6180-4 [contents] - 2018
- [j59]Haehyun Cho
, Jeong Hyun Yi
, Gail-Joon Ahn:
DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications. IEEE Access 6: 71229-71240 (2018) - [j58]Hyunki Kim, Taejoo Cho, Gail-Joon Ahn, Jeong Hyun Yi:
Risk assessment of mobile applications based on machine learned malware dataset. Multim. Tools Appl. 77(4): 5027-5042 (2018) - [j57]Xinxin Zhao, Lingjun Li, Guoliang Xue
, Gail-Joon Ahn
:
Efficient Anonymous Message Submission. IEEE Trans. Dependable Secur. Comput. 15(2): 217-230 (2018) - [j56]Jing Chen
, Chiheng Wang
, Ziming Zhao, Kai Chen
, Ruiying Du, Gail-Joon Ahn
:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [c150]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - [c149]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c148]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c147]Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
CacheLight: Defeating the CacheKit Attack. ASHES@CCS 2018: 65-74 - [c146]Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. CCS 2018: 664-676 - [c145]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS. CHASE 2018: 94-99 - [c144]Vaibhav Hemant Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
Challenges and Preparedness of SDN-based Firewalls. SDN-NFV@CODASPY 2018: 33-38 - [c143]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - [c142]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - [c141]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Challenges, Opportunities and a Framework for Web Environment Forensics. IFIP Int. Conf. Digital Forensics 2018: 11-33 - [c140]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c139]Vu Coughlin, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems. SmartGridComm 2018: 1-6 - [e16]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [e15]Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [e14]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [r2]Gail-Joon Ahn:
Discretionary Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j55]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward Standardization of Authenticated Caller ID Transmission. IEEE Commun. Stand. Mag. 1(3): 30-36 (2017) - [j54]Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
E-mail Header Injection Vulnerabilities. it Inf. Technol. 59(2): 67 (2017) - [c138]Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupé, Ziming Zhao, Marthony Taguinod, Gail-Joon Ahn:
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. AAMAS 2017: 178-186 - [c137]Carlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c136]Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. CNS 2017: 1-9 - [c135]Niall McLaughlin, Jesús Martínez del Rincón
, BooJoong Kang, Suleiman Y. Yerima, Paul C. Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c134]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - [c133]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c132]Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukwha Kyung, Dijiang Huang, Gail-Joon Ahn:
Science DMZ: SDN based secured cloud testbed. NFV-SDN 2017: 1-2 - [c131]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - [c130]Nishant Vishwamitra, Yifang Li
, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - [c129]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - [e13]Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita:
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017. ACM 2017, ISBN 978-1-4503-4523-1 [contents] - [e12]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - 2016
- [j53]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j52]Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [c128]Satya Gautam Vadlamudi, Sailik Sengupta, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Subbarao Kambhampati:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). AAMAS 2016: 1377-1378 - [c127]Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi
:
Checking Intent-based Communication in Android with Intent Space Analysis. AsiaCCS 2016: 735-746 - [c126]Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyMix: Toward SDN-based Intelligent Honeynet. SDN-NFV@CODASPY 2016: 1-6 - [c125]Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - [c124]Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black:
Towards Automated Threat Intelligence Fusion. CIC 2016: 408-416 - [c123]Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13 - [c122]Dae-il Jang, Gail-Joon Ahn, Hyunuk Hwang, Kibom Kim:
Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper). IRI 2016: 609-614 - [c121]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation. Kaleidoscope 2016: 1-8 - [c120]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c119]Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. IEEE Symposium on Security and Privacy 2016: 320-338 - [e11]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - [i4]Satya Gautam Vadlamudi, Sailik Sengupta, Subbarao Kambhampati, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. CoRR abs/1602.07024 (2016) - 2015
- [j51]Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. Comput. Secur. 52: 250 (2015) - [j50]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Trans. Collab. Comput. 1(6): e3 (2015) - [j49]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j48]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - [c118]Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann:
ACTRA: A Case Study for Threat Information Sharing. WISCS@CCS 2015: 23-26 - [c117]Khaled Riad
, Yan Zhu, Hongxin Hu, Gail-Joon Ahn:
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. CIC 2015: 28-35 - [c116]Napoleon Paxton, Dae-il Jang, Stephen Russell, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden:
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. HICSS 2015: 5244-5252 - [c115]Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward a Moving Target Defense for Web Applications. IRI 2015: 510-517 - [c114]Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi, Younghee Park:
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. NFV-SDN 2015: 107-114 - [c113]Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - [e10]Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3 [contents] - 2014
- [j47]Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - [c112]Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c111]Gail-Joon Ahn, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - [c110]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c109]Napoleon Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-Joon Ahn, Stephen Russell:
Discovering and analyzing deviant communities: Methods and experiments. CollaborateCom 2014: 163-170 - [c108]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving security assurance with assertion-based application construction. CollaborateCom 2014: 503-510 - [c107]Wonkyu Han, Hongxin Hu, Gail-Joon Ahn:
LPM: Layered Policy Management for Software-Defined Networks. DBSec 2014: 356-363 - [c106]Clinton D'Souza, Gail-Joon Ahn, Marthony Taguinod:
Policy-driven security management for fog computing: Preliminary framework and a case study. IRI 2014: 16-23 - [c105]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c104]Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c103]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - [e9]Gail-Joon Ahn, Moti Yung, Ninghui Li:
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. ACM 2014, ISBN 978-1-4503-2957-6 [contents] - [e8]Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein, Gail-Joon Ahn:
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3153-1 [contents] - [e7]Gail-Joon Ahn, Alina Oprea, Reihaneh Safavi-Naini:
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3239-2 [contents] - [e6]Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo:
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3149-4 [contents] - [e5]Gail-Joon Ahn, Tomas Sander:
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, WISCS '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3151-7 [contents] - [e4]Gail-Joon Ahn, Anupam Datta:
Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3148-7 [contents] - 2013
- [j46]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [j45]Lawrence Teo, Gail-Joon Ahn:
Extensible policy framework for heterogeneous network environments. Int. J. Inf. Comput. Secur. 5(4): 251-274 (2013) - [j44]Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization-based policy analysis for SELinux: framework and user study. Int. J. Inf. Sec. 12(3): 155-171 (2013) - [j43]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Discovery and Resolution of Anomalies in Web Access Control Policies. IEEE Trans. Dependable Secur. Comput. 10(6): 341-354 (2013) - [j42]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013) - [j41]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Multiparty Access Control for Online Social Networks: Model and Mechanisms. IEEE Trans. Knowl. Data Eng. 25(7): 1614-1627 (2013) - [j40]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu:
Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Serv. Comput. 6(2): 227-238 (2013) - [c102]Ziming Zhao, Gail-Joon Ahn:
Using instruction sequence abstraction for shellcode detection and attribution. CNS 2013: 323-331 - [c101]Justin Paglierani, Mike Mabey, Gail-Joon Ahn:
Towards comprehensive and collaborative forensics on email evidence. CollaborateCom 2013: 11-20 - [c100]Carlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn:
Supporting secure collaborations with attribute-based access control. CollaborateCom 2013: 525-530 - [c99]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. COMPSAC 2013: 21-26 - [c98]Wonkyu Han, Mike Mabey, Gail-Joon Ahn:
Simulation-based validation for smart grid environments. IRI 2013: 14-21 - [c97]Wonkyu Han, Mike Mabey, Gail-Joon Ahn, Tae Sung Kim:
Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results. IRI (best papers) 2013: 27-44 - [c96]Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. SocialCom 2013: 423-428 - [c95]Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. USENIX Security Symposium 2013: 383-398 - 2012
- [j39]Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn, Hong-Jia Zhao:
Efficient construction of provably secure steganography under ordinary covert channels. Sci. China Inf. Sci. 55(7): 1639-1649 (2012) - [j38]Mohamed Shehab, Anna Cinzia Squicciarini
, Gail-Joon Ahn, Irini Kokkinou:
Access control for online social networks third party applications. Comput. Secur. 31(8): 897-911 (2012) - [j37]Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012) - [j36]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Towards HIPAA-Compliant Healthcare Systems in Cloud Computing. Int. J. Comput. Model. Algorithms Medicine 3(2): 1-22 (2012) - [j35]Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu, Gail-Joon Ahn:
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Inf. Softw. Technol. 54(12): 1396-1417 (2012) - [j34]Gail-Joon Ahn, Jing Jin, Mohamed Shehab:
Policy-driven role-based access management for ad-hoc collaboration. J. Comput. Secur. 20(2-3): 223-257 (2012) - [j33]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5): 1083-1095 (2012) - [j32]William R. Claycomb, Dongwan Shin, Gail-Joon Ahn:
Enhancing directory virtualization to detect insider activity. Secur. Commun. Networks 5(8): 873-886 (2012) - [j31]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. IEEE Trans. Dependable Secur. Comput. 9(2): 250-260 (2012) - [j30]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Detecting and Resolving Firewall Policy Anomalies. IEEE Trans. Dependable Secur. Comput. 9(3): 318-331 (2012) - [j29]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [j28]