Gail-Joon Ahn Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

71EEWenjuan Xu, Xinwen Zhang, Gail-Joon Ahn: Towards System Integrity Protection with Graph-Based Policy Analysis. DBSec 2009: 65-80
70EEJing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang: Patient-centric authorization framework for sharing electronic health records. SACMAT 2009: 125-134
69EEKarsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn: Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ACSAC 2008: 257-266
68EEJing Jin, Gail-Joon Ahn, Michael J. Covington, Xinwen Zhang: Access Control Model for Sharing Composite Electronic Health Records. CollaborateCom 2008: 340-354
67EEMizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa: Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. ER 2008: 183-198
66EEMohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn: Beyond User-to-User Access Control for Online Social Networks. ICICS 2008: 174-189
65EEGail-Joon Ahn, Wenjuan Xu, Xinwen Zhang: Systematic Policy Analysis for High-Assurance Services in SELinux. POLICY 2008: 3-10
64EEWenjuan Xu, Mohamed Shehab, Gail-Joon Ahn: Visualization based policy analysis: case study in SELinux. SACMAT 2008: 165-174
63EEHongxin Hu, Gail-Joon Ahn: Enabling verification and conformance testing for access control model. SACMAT 2008: 195-204
62EEGail-Joon Ahn, Moonam Ko, Mohamed Shehab: Portable User-Centric Identity Management. SEC 2008: 573-587
61EEKarsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla: Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008)
60EESeng-Phil Hong, Gail-Joon Ahn, Wenjuan Xu: Access Control Management for SCADA Systems. IEICE Transactions 91-D(10): 2449-2457 (2008)
59 Steve Barker, Gail-Joon Ahn: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings Springer 2007
58EEBei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young: Collegiate Cyber Game Design Criteria and Participation. ACIS-ICIS 2007: 1036-1041
57EELawrence Teo, Gail-Joon Ahn: Managing heterogeneous network environments using an extensible policy framework. ASIACCS 2007: 362-364
56EEGail-Joon Ahn, Moonam Ko: User-centric privacy management for federated identity management. CollaborateCom 2007: 187-195
55EEJing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu: Towards trust-aware access management for ad-hoc collaborations. CollaborateCom 2007: 41-48
54EENapoleon Paxton, Gail-Joon Ahn, Bill Chu: Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. IRI 2007: 73-78
53EEGail-Joon Ahn, Dhruv Gami: Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. ISCC 2007: 865-870
52EELawrence Teo, Gail-Joon Ahn: Towards Effective Security Policy Management for Heterogeneous Network Environments. POLICY 2007: 241-245
51EEGail-Joon Ahn, Hongxin Hu: Towards realizing a formal RBAC model in real systems. SACMAT 2007: 215-224
50EEGail-Joon Ahn: Guest editorial: Special issue on access control models and technologies. ACM Trans. Inf. Syst. Secur. 10(1): (2007)
49EEGail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong: Towards secure information sharing using role-based delegation. J. Network and Computer Applications 30(1): 42-59 (2007)
48EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn: Certification process artifacts defined as measurable units for software assurance. Software Process: Improvement and Practice 12(2): 165-189 (2007)
47EEJing Jin, Gail-Joon Ahn, Mukesh Singhal: ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. EDBT Workshops 2006: 724-740
46EEJing Jin, Gail-Joon Ahn: Role-based access management for ad-hoc collaborative sharing. SACMAT 2006: 200-209
45EESeok Won Lee, Divya Muthurajan, Robin A. Gandhi, Deepak S. Yavagal, Gail-Joon Ahn: Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance. International Journal of Software Engineering and Knowledge Engineering 16(6): 851-884 (2006)
44 Elena Ferrari, Gail-Joon Ahn: SACMAT 2005, 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005, Proceedings ACM 2005
43EEDeepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi: Common criteria requirements modeling and its uses for quality of information assurance (QoIA). ACM Southeast Regional Conference (2) 2005: 130-135
42EELawrence Teo, Gail-Joon Ahn: Supporting access control policies across multiple operating systems. ACM Southeast Regional Conference (2) 2005: 288-293
41EEGail-Joon Ahn, John Lam: Managing privacy preferences for federated identity management. Digital Identity Management 2005: 28-36
40EEKarsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge: Specification and Validation of Authorisation Constraints Using UML and OCL. ESORICS 2005: 64-79
39EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal: Active Automation of the DITSCAP. ISI 2005: 479-485
38EEKarsten Sohr, Michael Drouineaud, Gail-Joon Ahn: Formal specification of role-based security policies for clinical information systems. SAC 2005: 332-339
37EEWilliam J. Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong: Access control in collaborative systems. ACM Comput. Surv. 37(1): 29-41 (2005)
36EEKarsten Sohr, Gail-Joon Ahn, Lars Migge: Articulating and enforcing authorisation policies with UML and OCL. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
35EESeok Won Lee, Robin A. Gandhi, Gail-Joon Ahn: Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
34 Dongwan Shin, Gail-Joon Ahn: Role-based privilege and trust management. Comput. Syst. Sci. Eng. 20(6): (2005)
33EEJoshua Foster, Kalpathi R. Subramanian, Robert Herring, Gail-Joon Ahn: Interactive Exploration of the AFS File System. INFOVIS 2004
32 Dongwan Shin, Gail-Joon Ahn: Role-based Trust Assignment in Trust Management Systems. ISCA PDCS 2004: 551-558
31EEGail-Joon Ahn, Badrinath Mohan: Secure Information Sharing Using Role-based Delegation. ITCC (2) 2004: 810-819
30EELawrence Teo, Yu-An Sun, Gail-Joon Ahn: Defeating Internet Attacks Using Risk Awareness and Active Honeypots. IWIA 2004: 155-168
29EEGail-Joon Ahn, Dongwan Shin, Longhua Zhang: Role-Based Privilege Management Using Attribute Certificates and Delegation. TrustBus 2004: 100-109
28EEGail-Joon Ahn, Dongwan Shin, Seng-Phil Hong: Information Assurance in Federated Identity Management: Experimentations and Issues. WISE 2004: 78-89
27 Gail-Joon Ahn, Seng-Phil Hong: Group Hierarchies with Constrained User Assignment in Linux. WOSIS 2004: 13-22
26EEDongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: A role-based infrastructure management system: design and implementation. Concurrency - Practice and Experience 16(11): 1121-1141 (2004)
25EELawrence Teo, Yuliang Zheng, Gail-Joon Ahn: Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88
24 Gail-Joon Ahn, Badrinath Mohan: Role-Based Authorization in Decentralized Health Care Environments. SAC 2003: 251-256
23 Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation. SAC 2003: 325-330
22EEDavid F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila: The role control center: features and case studies. SACMAT 2003: 12-20
21EEDongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin: On modeling system-centric information for role engineering. SACMAT 2003: 169-178
20EELawrence Teo, Gail-Joon Ahn, Yuliang Zheng: Dynamic and risk-aware network access management. SACMAT 2003: 217-230
19 Longhua Zhang, Gail-Joon Ahn: Constrained Role-based Delegation. SEC 2003: 289-300
18EEGail-Joon Ahn: Specification and Classification of Role-based Authorization Policies. WETICE 2003: 202-207
17EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003)
16EEDongwan Shin, Gail-Joon Ahn, Joon S. Park: An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939
15 Dongwan Shin, Gail-Joon Ahn, Sangrae Cho: Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60
14 William J. Tolone, Bei-tseng Chu, Gail-Joon Ahn, Robert G. Wilhelm, John E. Sims: Challenges to Multi-Enterprise Integration. ICEIMT 2002: 205-216
13EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A role-based delegation framework for healthcare information systems. SACMAT 2002: 125-134
12EEGail-Joon Ahn, Dongwan Shin: Towards Scalable Authentication in Health Services. WETICE 2002: 83-88
11 Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin: Reconstructing a formal security model. Information & Software Technology 44(11): 649-657 (2002)
10 Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30
9EELonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu: A rule-based framework for role based delegation. SACMAT 2001: 153-162
8EEGail-Joon Ahn, Michael E. Shin: Role-Based Authorization Constraints Specification Using Object Constraint Language. WETICE 2001: 157-162
7EEJoon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001)
6EEGail-Joon Ahn, Ravi S. Sandhu: Decentralized user group assignment in Windows NT. Journal of Systems and Software 56(1): 39-49 (2001)
5EEGail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10
4EEMichael E. Shin, Gail-Joon Ahn: UML-Based Representation of Role-Based Access Control. WETICE 2000: 195-200
3EEGail-Joon Ahn, Ravi S. Sandhu: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226 (2000)
2EEGail-Joon Ahn: Role-based access control in DCOM. Journal of Systems Architecture 46(13): 1175-1184 (2000)
1EEGail-Joon Ahn, Ravi S. Sandhu: The RSL99 Language for Role-Based Separation of Duty Constraints. ACM Workshop on Role-Based Access Control 1999: 43-54

Coauthor Index

1Xinyu Bao [69]
2Steve Barker [59]
3Steven Blanchard [58]
4Ramaswamy Chandramouli [22]
5Sangrae Cho [15] [21] [23] [26]
6Bei-tseng Chu [9] [13] [14] [17] [58]
7Bill Chu [54]
8Michael J. Covington [68] [70]
9James Deese [58]
10Michael Drouineaud [38] [61]
11David F. Ferraiolo [22]
12Elena Ferrari [44]
13Joshua Foster [33]
14Dhruv Gami [53]
15Robin A. Gandhi [35] [39] [43] [45] [48]
16Serban I. Gavrila [22]
17Martin Gogolla [40] [61]
18Robert Herring [33]
19Seng-Phil Hong [11] [27] [28] [37] [49] [60]
20Hongxin Hu [51] [55] [63] [70]
21Mizuho Iwaihara [67]
22Jing Jin [46] [47] [55] [68] [70]
23Seunghun Jin [21] [23] [26]
24Myong H. Kang [5]
25Richard Kelly [58]
26Moonam Ko [56] [62]
27John Lam [41]
28Seok Won Lee [35] [39] [43] [45] [48]
29Lars Migge [36] [40]
30Badrinath Mohan [24] [31] [49]
31Kohei Murakami [67]
32Tanveer Mustafa [69]
33Divya Muthurajan [45]
34Tanusree Pai [37]
35Joon S. Park [5] [7] [10] [16]
36Napoleon Paxton [54]
37Ravi S. Sandhu [1] [3] [5] [6] [7] [10]
38Mohamed Shehab [55] [62] [64] [66]
39Dongwan Shin [12] [15] [16] [21] [23] [26] [28] [29] [32] [34]
40Michael Eonsuk Shin (Michael E. Shin) [4] [8] [11]
41John E. Sims [14]
42Mukesh Singhal [47]
43Karsten Sohr [36] [38] [40] [61] [69]
44Anna Cinzia Squicciarini [66]
45Kalpathi R. Subramanian [33]
46Yu-An Sun [30]
47Lawrence Teo [20] [25] [30] [42] [52] [57]
48William J. Tolone [14] [37]
49Robert G. Wilhelm [14]
50Wenjuan Xu [60] [64] [65] [71]
51Deepak S. Yavagal [39] [43] [45]
52Masatoshi Yoshikawa [67]
53Ashika Young [58]
54Huiming Yu [58]
55Longhua Zhang [9] [13] [17] [19] [29]
56Xinwen Zhang [65] [68] [70] [71]
57Yuliang Zheng [20] [25]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)