The SCEAS System
Navigation Menu

Search the dblp DataBase


Gail-Joon Ahn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lawrence Teo, Gail-Joon Ahn
    Supporting access control policies across multiple operating systems. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:288-293 [Conf]
  2. Deepak S. Yavagal, Seok Won Lee, Gail-Joon Ahn, Robin A. Gandhi
    Common criteria requirements modeling and its uses for quality of information assurance (QoIA). [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:130-135 [Conf]
  3. Dongwan Shin, Gail-Joon Ahn
    Role-based Trust Assignment in Trust Management Systems. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:551-558 [Conf]
  4. Lawrence Teo, Gail-Joon Ahn
    Managing heterogeneous network environments using an extensible policy framework. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:362-364 [Conf]
  5. Dongwan Shin, Gail-Joon Ahn, Joon S. Park
    An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:934-939 [Conf]
  6. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu
    Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:19-30 [Conf]
  7. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho
    Using X.509 Attribute Certificates for Role-Based EAM. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:49-60 [Conf]
  8. Gail-Joon Ahn, John Lam
    Managing privacy preferences for federated identity management. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:28-36 [Conf]
  9. Jing Jin, Gail-Joon Ahn, Mukesh Singhal
    ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2006, pp:724-740 [Conf]
  10. Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge
    Specification and Validation of Authorisation Constraints Using UML and OCL. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:64-79 [Conf]
  11. William J. Tolone, Bei-tseng Chu, Gail-Joon Ahn, Robert G. Wilhelm, John E. Sims
    Challenges to Multi-Enterprise Integration. [Citation Graph (0, 0)][DBLP]
    ICEIMT, 2002, pp:205-216 [Conf]
  12. Joshua Foster, Kalpathi R. Subramanian, Robert Herring, Gail-Joon Ahn
    Interactive Exploration of the AFS File System. [Citation Graph (0, 0)][DBLP]
    INFOVIS, 2004, pp:- [Conf]
  13. Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal
    Active Automation of the DITSCAP. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:479-485 [Conf]
  14. Gail-Joon Ahn, Badrinath Mohan
    Secure Information Sharing Using Role-based Delegation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:810-819 [Conf]
  15. Lawrence Teo, Yu-An Sun, Gail-Joon Ahn
    Defeating Internet Attacks Using Risk Awareness and Active Honeypots. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:155-168 [Conf]
  16. Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn
    Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:73-88 [Conf]
  17. Gail-Joon Ahn, Ravi S. Sandhu
    The RSL99 Language for Role-Based Separation of Duty Constraints. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:43-54 [Conf]
  18. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
    Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
  19. Gail-Joon Ahn, Badrinath Mohan
    Role-Based Authorization in Decentralized Health Care Environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:251-256 [Conf]
  20. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
    A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:325-330 [Conf]
  21. Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn
    Formal specification of role-based security policies for clinical information systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:332-339 [Conf]
  22. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
    On modeling system-centric information for role engineering. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:169-178 [Conf]
  23. Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
    Dynamic and risk-aware network access management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:217-230 [Conf]
  24. David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila
    The role control center: features and case studies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:12-20 [Conf]
  25. Jing Jin, Gail-Joon Ahn
    Role-based access management for ad-hoc collaborative sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:200-209 [Conf]
  26. Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
    A rule-based framework for role based delegation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:153-162 [Conf]
  27. Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
    A role-based delegation framework for healthcare information systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:125-134 [Conf]
  28. Longhua Zhang, Gail-Joon Ahn
    Constrained Role-based Delegation. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:289-300 [Conf]
  29. Gail-Joon Ahn, Seng-Phil Hong
    Group Hierarchies with Constrained User Assignment in Linux. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:13-22 [Conf]
  30. Gail-Joon Ahn, Dongwan Shin, Longhua Zhang
    Role-Based Privilege Management Using Attribute Certificates and Delegation. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:100-109 [Conf]
  31. Gail-Joon Ahn
    Specification and Classification of Role-based Authorization Policies. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:202-207 [Conf]
  32. Gail-Joon Ahn, Michael E. Shin
    Role-Based Authorization Constraints Specification Using Object Constraint Language. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:157-162 [Conf]
  33. Gail-Joon Ahn, Dongwan Shin
    Towards Scalable Authentication in Health Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:83-88 [Conf]
  34. Michael E. Shin, Gail-Joon Ahn
    UML-Based Representation of Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:195-200 [Conf]
  35. Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong
    Information Assurance in Federated Identity Management: Experimentations and Issues. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:78-89 [Conf]
  36. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
    A role-based infrastructure management system: design and implementation. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1121-1141 [Journal]
  37. Dongwan Shin, Gail-Joon Ahn
    Role-based privilege and trust management. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  38. William J. Tolone, Gail-Joon Ahn, Tanusree Pai, Seng-Phil Hong
    Access control in collaborative systems. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2005, v:37, n:1, pp:29-41 [Journal]
  39. Seok Won Lee, Divya Muthurajan, Robin A. Gandhi, Deepak S. Yavagal, Gail-Joon Ahn
    Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:6, pp:851-884 [Journal]
  40. Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin
    Reconstructing a formal security model. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:11, pp:649-657 [Journal]
  41. Gail-Joon Ahn, Ravi S. Sandhu
    Decentralized user group assignment in Windows NT. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:56, n:1, pp:39-49 [Journal]
  42. Gail-Joon Ahn, Ravi S. Sandhu
    Role-based authorization constraints specification. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:207-226 [Journal]
  43. Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn
    Role-based access control on the web. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:37-71 [Journal]
  44. Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
    A rule-based framework for role-based delegation and revocation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:3, pp:404-441 [Journal]
  45. Gail-Joon Ahn
    Guest editorial: Special issue on access control models and technologies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal]
  46. Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young
    Collegiate Cyber Game Design Criteria and Participation. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:1036-1041 [Conf]
  47. Napoleon Paxton, Gail-Joon Ahn, Bill Chu
    Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:73-78 [Conf]
  48. Lawrence Teo, Gail-Joon Ahn
    Towards Effective Security Policy Management for Heterogeneous Network Environments. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:241-245 [Conf]
  49. Gail-Joon Ahn, Hongxin Hu
    Towards realizing a formal RBAC model in real systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:215-224 [Conf]
  50. Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong
    Towards secure information sharing using role-based delegation. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:42-59 [Journal]

  51. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. [Citation Graph (, )][DBLP]

  52. Cryptographic role-based security mechanisms based on role-key hierarchy. [Citation Graph (, )][DBLP]

  53. A Framework for Enabling User-Controlled Persona in Online Social Networks. [Citation Graph (, )][DBLP]

  54. Towards System Integrity Protection with Graph-Based Policy Analysis. [Citation Graph (, )][DBLP]

  55. Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. [Citation Graph (, )][DBLP]

  56. DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. [Citation Graph (, )][DBLP]

  57. Privacy-Enhanced User-Centric Identity Management. [Citation Graph (, )][DBLP]

  58. Beyond User-to-User Access Control for Online Social Networks. [Citation Graph (, )][DBLP]

  59. Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. [Citation Graph (, )][DBLP]

  60. Systematic Policy Analysis for High-Assurance Services in SELinux. [Citation Graph (, )][DBLP]

  61. Enabling verification and conformance testing for access control model. [Citation Graph (, )][DBLP]

  62. Visualization based policy analysis: case study in SELinux. [Citation Graph (, )][DBLP]

  63. Patient-centric authorization framework for sharing electronic health records. [Citation Graph (, )][DBLP]

  64. Portable User-Centric Identity Management. [Citation Graph (, )][DBLP]

  65. User-centric privacy management for federated identity management. [Citation Graph (, )][DBLP]

  66. Towards trust-aware access management for ad-hoc collaborations. [Citation Graph (, )][DBLP]

  67. Access Control Model for Sharing Composite Electronic Health Records. [Citation Graph (, )][DBLP]

Search in 0.130secs, Finished in 0.133secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002