BibTeX records: Gail-Joon Ahn

download as .bib file

@article{DBLP:journals/isf/RubioMedranoSHCBSA23,
  author       = {Carlos E. Rubio{-}Medrano and
                  Pradeep Kumar Duraisamy Soundrapandian and
                  Matthew Hill and
                  Luis Claramunt and
                  Jaejong Baek and
                  Geetha S and
                  Gail{-}Joon Ahn},
  title        = {DyPolDroid: Protecting Against Permission-Abuse Attacks in Android},
  journal      = {Inf. Syst. Frontiers},
  volume       = {25},
  number       = {2},
  pages        = {529--548},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10796-022-10328-8},
  doi          = {10.1007/S10796-022-10328-8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/RubioMedranoSHCBSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BaekSKWSDA23,
  author       = {Jaejong Baek and
                  Pradeep Kumar Duraisamy Soundrapandian and
                  Sukwha Kyung and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Targeted Privacy Attacks by Fingerprinting Mobile Apps in {LTE} Radio
                  Layer},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {261--273},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00035},
  doi          = {10.1109/DSN58367.2023.00035},
  timestamp    = {Tue, 15 Aug 2023 11:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/BaekSKWSDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ClaramuntRBA23,
  author       = {Luis Claramunt and
                  Carlos E. Rubio{-}Medrano and
                  Jaejong Baek and
                  Gail{-}Joon Ahn},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {SpaceMediator: Leveraging Authorization Policies to Prevent Spatial
                  and Privacy Attacks in Mobile Augmented Reality},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593839},
  doi          = {10.1145/3589608.3593839},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ClaramuntRBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-04896,
  author       = {Erin Lanus and
                  Charles J. Colbourn and
                  Gail{-}Joon Ahn},
  title        = {Guaranteeing Anonymity in Attribute-Based Authorization},
  journal      = {CoRR},
  volume       = {abs/2310.04896},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.04896},
  doi          = {10.48550/ARXIV.2310.04896},
  eprinttype    = {arXiv},
  eprint       = {2310.04896},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-04896.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZhangOCSJWSKBWS22,
  author       = {Penghui Zhang and
                  Adam Oest and
                  Haehyun Cho and
                  Zhibo Sun and
                  RC Johnson and
                  Brad Wardman and
                  Shaown Sarker and
                  Alexandros Kapravelos and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques
                  in Phishing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {2},
  pages        = {10--21},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3129992},
  doi          = {10.1109/MSEC.2021.3129992},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZhangOCSJWSKBWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/ChoPOB0SDA22,
  author       = {Haehyun Cho and
                  Jinbum Park and
                  Adam Oest and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Babak Falsafi and
                  Michael Ferdman and
                  Shan Lu and
                  Thomas F. Wenisch},
  title        = {ViK: practical mitigation of temporal memory safety violations through
                  object {ID} inspection},
  booktitle    = {{ASPLOS} '22: 27th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Lausanne,
                  Switzerland, 28 February 2022 - 4 March 2022},
  pages        = {271--284},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503222.3507780},
  doi          = {10.1145/3503222.3507780},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/ChoPOB0SDA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSKBBCO0BSA22,
  author       = {Penghui Zhang and
                  Zhibo Sun and
                  Sukwha Kyung and
                  Hans Walter Behrens and
                  Zion Leonahenahe Basque and
                  Haehyun Cho and
                  Adam Oest and
                  Ruoyu Wang and
                  Tiffany Bao and
                  Yan Shoshitaishvili and
                  Gail{-}Joon Ahn and
                  Adam Doup{\'{e}}},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {I'm SPARTACUS, No, I'm {SPARTACUS:} Proactively Protecting Users from
                  Phishing by Intentionally Triggering Cloaking Behavior},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3165--3179},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559334},
  doi          = {10.1145/3548606.3559334},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangSKBBCO0BSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VishwamitraLHC022,
  author       = {Nishant Vishwamitra and
                  Yifang Li and
                  Hongxin Hu and
                  Kelly Caine and
                  Long Cheng and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Towards Automated Content-based Photo Privacy Control in User-Centered
                  Social Networks},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511517},
  doi          = {10.1145/3508398.3511517},
  timestamp    = {Wed, 20 Apr 2022 12:17:48 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/VishwamitraLHC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenWHZCDA21,
  author       = {Jing Chen and
                  Chiheng Wang and
                  Kun He and
                  Ziming Zhao and
                  Min Chen and
                  Ruiying Du and
                  Gail{-}Joon Ahn},
  title        = {Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight
                  Assignment for Mobile Apps},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {15--29},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2871682},
  doi          = {10.1109/TDSC.2018.2871682},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenWHZCDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/KimCKDSAD21,
  author       = {Doowon Kim and
                  Haehyun Cho and
                  Yonghwi Kwon and
                  Adam Doup{\'{e}} and
                  Sooel Son and
                  Gail{-}Joon Ahn and
                  Tudor Dumitras},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Security Analysis on Practices of Certificate Authorities in the {HTTPS}
                  Phishing Ecosystem},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {407--420},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453100},
  doi          = {10.1145/3433210.3453100},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/KimCKDSAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/HillRCBA21,
  author       = {Matthew Hill and
                  Carlos E. Rubio{-}Medrano and
                  Luis Claramunt and
                  Jaejong Baek and
                  Gail{-}Joon Ahn},
  title        = {Poster: DyPolDroid: User-Centered Counter-Policies Against Android
                  Permission-Abuse Attacks},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {704--706},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00053},
  doi          = {10.1109/EUROSP51992.2021.00053},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/HillRCBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ClaramuntERBA21,
  author       = {Luis Claramunt and
                  Larissa Pokam Epse and
                  Carlos E. Rubio{-}Medrano and
                  Jaejong Baek and
                  Gail{-}Joon Ahn},
  title        = {Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented
                  Reality Technologies},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {713--715},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00056},
  doi          = {10.1109/EUROSP51992.2021.00056},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ClaramuntERBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SoundrapandianB21,
  author       = {Pradeep Kumar Duraisamy Soundrapandian and
                  Tiffany Bao and
                  Jaejong Baek and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Ruoyu Wang and
                  Gail{-}Joon Ahn},
  title        = {MuTent: Dynamic Android Intent Protection with Ownership-Based Key
                  Distribution and Security Contracts},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/71490},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SoundrapandianB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DinhCMOZKAB0DS21,
  author       = {Sung Ta Dinh and
                  Haehyun Cho and
                  Kyle Martin and
                  Adam Oest and
                  Kyle Zeng and
                  Alexandros Kapravelos and
                  Gail{-}Joon Ahn and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili},
  title        = {Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically
                  Correct Test Cases},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/favocado-fuzzing-the-binding-code-of-javascript-engines-using-semantically-correct-test-cases/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DinhCMOZKAB0DS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/Rubio-MedranoHC21,
  author       = {Carlos E. Rubio{-}Medrano and
                  Matthew Hill and
                  Luis M. Claramunt and
                  Jaejong Baek and
                  Gail{-}Joon Ahn},
  editor       = {Ram Krishnan and
                  H. Raghav Rao and
                  Sanjay K. Sahay and
                  Sagar Samtani and
                  Ziming Zhao},
  title        = {DyPolDroid: Protecting Users and Organizations from Permission-Abuse
                  Attacks in Android},
  booktitle    = {Secure Knowledge Management In The Artificial Intelligence Era - 9th
                  International Conference, {SKM} 2021, San Antonio, TX, USA, October
                  8-9, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1549},
  pages        = {23--36},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_2},
  doi          = {10.1007/978-3-030-97532-6\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/skm/Rubio-MedranoHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangOCSJWSKBWS21,
  author       = {Penghui Zhang and
                  Adam Oest and
                  Haehyun Cho and
                  Zhibo Sun and
                  RC Johnson and
                  Brad Wardman and
                  Shaown Sarker and
                  Alexandros Kapravelos and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques
                  in Phishing},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1109--1124},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00021},
  doi          = {10.1109/SP40001.2021.00021},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangOCSJWSKBWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunOZRB00SDA21,
  author       = {Zhibo Sun and
                  Adam Oest and
                  Penghui Zhang and
                  Carlos E. Rubio{-}Medrano and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Ziming Zhao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4169--4186},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhibo},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SunOZRB00SDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-12843,
  author       = {Marzieh Bitaab and
                  Haehyun Cho and
                  Adam Oest and
                  Penghui Zhang and
                  Zhibo Sun and
                  Rana Pourmohamad and
                  Doowon Kim and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing},
  journal      = {CoRR},
  volume       = {abs/2103.12843},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.12843},
  eprinttype    = {arXiv},
  eprint       = {2103.12843},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-12843.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Lopez-MoralesRD20,
  author       = {Efr{\'{e}}n L{\'{o}}pez{-}Morales and
                  Carlos E. Rubio{-}Medrano and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Tiffany Bao and
                  Gail{-}Joon Ahn},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {HoneyPLC: {A} Next-Generation Honeypot for Industrial Control Systems},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {279--291},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423356},
  doi          = {10.1145/3372297.3423356},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Lopez-MoralesRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/BitaabCOZSPKBWS20,
  author       = {Marzieh Bitaab and
                  Haehyun Cho and
                  Adam Oest and
                  Penghui Zhang and
                  Zhibo Sun and
                  Rana Pourmohamad and
                  Doowon Kim and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493260},
  doi          = {10.1109/ECRIME51433.2020.9493260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/BitaabCOZSPKBWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/ChoPK0SDA20,
  author       = {Haehyun Cho and
                  Jinbum Park and
                  Donguk Kim and
                  Ziming Zhao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Eyal de Lara and
                  Iqbal Mohomed and
                  Jason Nieh and
                  Elizabeth M. Belding},
  title        = {SmokeBomb: effective mitigation against cache side-channel attacks
                  on the {ARM} architecture},
  booktitle    = {MobiSys '20: The 18th Annual International Conference on Mobile Systems,
                  Applications, and Services, Toronto, Ontario, Canada, June 15-19,
                  2020},
  pages        = {107--120},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386901.3388888},
  doi          = {10.1145/3386901.3388888},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/ChoPK0SDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoCJ20,
  author       = {Carlos E. Rubio{-}Medrano and
                  Luis Claramunt and
                  Shaishavkumar Jogani and
                  Gail{-}Joon Ahn},
  editor       = {Jorge Lobo and
                  Scott D. Stoller and
                  Peng Liu},
  title        = {Proactive Risk Assessment for Preventing Attribute-Forgery Attacks
                  to {ABAC} Policies},
  booktitle    = {Proceedings of the 25th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020},
  pages        = {131--144},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3381991.3395615},
  doi          = {10.1145/3381991.3395615},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoCJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/Rubio-Medrano0A20,
  author       = {Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Toward Automated Enforcement of Cyber-Physical Security Requirements
                  for Energy Delivery Systems},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {319--322},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00048},
  doi          = {10.1109/TPS-ISA50397.2020.00048},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/Rubio-Medrano0A20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OestZWNBZTDA20,
  author       = {Adam Oest and
                  Penghui Zhang and
                  Brad Wardman and
                  Eric Nunes and
                  Jakub Burgis and
                  Ali Zand and
                  Kurt Thomas and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness
                  of Phishing Attacks at Scale},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {361--377},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-sunrise},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OestZWNBZTDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ChoPKB0SDA20,
  author       = {Haehyun Cho and
                  Jinbum Park and
                  Joonwon Kang and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Yuval Yarom and
                  Sarah Zennou},
  title        = {Exploiting Uses of Uninitialized Stack Variables in Linux Kernels
                  to Leak Kernel Pointers},
  booktitle    = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August
                  11, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/woot20/presentation/cho},
  timestamp    = {Mon, 01 Feb 2021 08:41:50 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/ChoPKB0SDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2020autosec,
  editor       = {Qi Alfred Chen and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {AutoSec@CODASPY '20: Proceedings of the Second {ACM} Workshop on Automotive
                  and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375706},
  doi          = {10.1145/3375706},
  isbn         = {978-1-4503-7113-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2020autosec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuHKWAZL19,
  author       = {Hongxin Hu and
                  Wonkyu Han and
                  Sukwha Kyung and
                  Juan Wang and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Hongda Li},
  title        = {Towards a reliable firewall for software-defined networks},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101597},
  doi          = {10.1016/J.COSE.2019.101597},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuHKWAZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AhnGHS19,
  author       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Guest Editors' Introduction: Special Section on Security in Emerging
                  Networking Technologies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {913--914},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2019.2906921},
  doi          = {10.1109/TDSC.2019.2906921},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KokuluSBS0DA19,
  author       = {Faris Bugra Kokulu and
                  Ananta Soneji and
                  Tiffany Bao and
                  Yan Shoshitaishvili and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Matched and Mismatched SOCs: {A} Qualitative Study on Security Operations
                  Center Issues},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1955--1970},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354239},
  doi          = {10.1145/3319535.3354239},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KokuluSBS0DA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChowdharyHAKKV19,
  author       = {Ankur Chowdhary and
                  Dijiang Huang and
                  Gail{-}Joon Ahn and
                  Myong H. Kang and
                  Anya Kim and
                  Alexander Velazquez},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {{SDNSOC:} Object Oriented {SDN} Framework},
  booktitle    = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop
                  on Security in Software Defined Networks {\&} Network Function
                  Virtualization, Richardson, TX, USA, March 27, 2019},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309194.3309196},
  doi          = {10.1145/3309194.3309196},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChowdharyHAKKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SunR0BDA19,
  author       = {Zhibo Sun and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Tiffany Bao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Understanding and Predicting Private Interactions in Underground Forums},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {303--314},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300036},
  doi          = {10.1145/3292006.3300036},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SunR0BDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/LampR0A19,
  author       = {Josephine Lamp and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting
                  Energy Delivery Systems},
  booktitle    = {7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems,
                  MSCPES@CPSIoTWeek 2019, Montreal, QC, Canada, April 15, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSCPES.2019.8738791},
  doi          = {10.1109/MSCPES.2019.8738791},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpsweek/LampR0A19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZhangC0DA19,
  author       = {Penghui Zhang and
                  Haehyun Cho and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {iCore: continuous and proactive extrospection on multi-core IoT devices},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {851--860},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297364},
  doi          = {10.1145/3297280.3297364},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ZhangC0DA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoJL19,
  author       = {Carlos E. Rubio{-}Medrano and
                  Shaishavkumar Jogani and
                  Maria Leitner and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive
                  Technologies},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325109},
  doi          = {10.1145/3322431.3325109},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OestSDAWT19,
  author       = {Adam Oest and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Brad Wardman and
                  Kevin Tyers},
  title        = {PhishFarm: {A} Scalable Framework for Measuring the Effectiveness
                  of Evasion Techniques against Browser Phishing Blacklists},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1344--1361},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00049},
  doi          = {10.1109/SP.2019.00049},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/OestSDAWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TuD0A19,
  author       = {Huahong Tu and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Users Really Do Answer Telephone Scams},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1327--1340},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/tu},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TuD0A19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2019,
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006},
  doi          = {10.1145/3292006},
  isbn         = {978-1-4503-6099-9},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2019autosec,
  editor       = {Ziming Zhao and
                  Qi Alfred Chen and
                  Gail{-}Joon Ahn},
  title        = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY
                  2019, Richardson, TX, USA, March 27, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309171},
  doi          = {10.1145/3309171},
  isbn         = {978-1-4503-6180-4},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2019autosec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2019sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop
                  on Security in Software Defined Networks {\&} Network Function
                  Virtualization, Richardson, TX, USA, March 27, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309194},
  doi          = {10.1145/3309194},
  isbn         = {978-1-4503-6179-8},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2019sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoYA18,
  author       = {Haehyun Cho and
                  Jeong Hyun Yi and
                  Gail{-}Joon Ahn},
  title        = {DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android
                  Applications},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {71229--71240},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2881699},
  doi          = {10.1109/ACCESS.2018.2881699},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoYA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimCAY18,
  author       = {Hyunki Kim and
                  Taejoo Cho and
                  Gail{-}Joon Ahn and
                  Jeong Hyun Yi},
  title        = {Risk assessment of mobile applications based on machine learned malware
                  dataset},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {4},
  pages        = {5027--5042},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4756-0},
  doi          = {10.1007/S11042-017-4756-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimCAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoLXA18,
  author       = {Xinxin Zhao and
                  Lingjun Li and
                  Guoliang Xue and
                  Gail{-}Joon Ahn},
  title        = {Efficient Anonymous Message Submission},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {217--230},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2556659},
  doi          = {10.1109/TDSC.2016.2556659},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoLXA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWZCDA18,
  author       = {Jing Chen and
                  Chiheng Wang and
                  Ziming Zhao and
                  Kai Chen and
                  Ruiying Du and
                  Gail{-}Joon Ahn},
  title        = {Uncovering the Face of Android Ransomware: Characterization and Real-Time
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1286--1300},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787905},
  doi          = {10.1109/TIFS.2017.2787905},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWZCDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaekKC0SDA18,
  author       = {Jaejong Baek and
                  Sukwha Kyung and
                  Haehyun Cho and
                  Ziming Zhao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi
                  Calling},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {278--288},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274753},
  doi          = {10.1145/3274694.3274753},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BaekKC0SDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChoZKPL0DA18,
  author       = {Haehyun Cho and
                  Penghui Zhang and
                  Donguk Kim and
                  Jinbum Park and
                  Choong{-}Hoon Lee and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Prime+Count: Novel Cross-world Covert Channels on {ARM} TrustZone},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {441--452},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274704},
  doi          = {10.1145/3274694.3274704},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChoZKPL0DA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiHGAZ18,
  author       = {Hongda Li and
                  Hongxin Hu and
                  Guofei Gu and
                  Gail{-}Joon Ahn and
                  Fuqiang Zhang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {vNIDS: Towards Elastic Security with Safe and Efficient Virtualization
                  of Network Intrusion Detection Systems},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {17--34},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243862},
  doi          = {10.1145/3243734.3243862},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiHGAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gutierrez0DSA18,
  author       = {Mauricio Gutierrez and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Gail{-}Joon Ahn},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {CacheLight: Defeating the CacheKit Attack},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266449},
  doi          = {10.1145/3266444.3266449},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Gutierrez0DSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DixitDS0A18,
  author       = {Vaibhav Hemant Dixit and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{AIM-SDN:} Attacking Information Mismanagement in SDN-datastores},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {664--676},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243799},
  doi          = {10.1145/3243734.3243799},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DixitDS0A18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/LampR0A18,
  author       = {Josephine Lamp and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Weisong Shi and
                  Anwar Walid and
                  E. Kevin Hall and
                  Fei Wang and
                  Gang Zhou},
  title        = {The Danger of Missing Instructions: {A} Systematic Analysis of Security
                  Requirements for {MCPS}},
  booktitle    = {Proceedings of the Third {IEEE/ACM} International Conference on Connected
                  Health: Applications, Systems and Engineering Technologies, {CHASE}
                  2018, Washington, DC, USA, September 26-28, 2018},
  pages        = {94--99},
  publisher    = {{ACM} / {IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3278576.3278602},
  doi          = {10.1145/3278576.3278602},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chase/LampR0A18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/DixitKZDSA18,
  author       = {Vaibhav Hemant Dixit and
                  Sukwha Kyung and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Yan Shoshitaishvili and
                  Gail{-}Joon Ahn},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Challenges and Preparedness of SDN-based Firewalls},
  booktitle    = {Proceedings of the 2018 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180465.3180468},
  doi          = {10.1145/3180465.3180468},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/DixitKZDSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhangNCZDA18,
  author       = {Penghui Zhang and
                  Bernard Ngabonziza and
                  Haehyun Cho and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {SeCore: Continuous Extrospection with High Visibility on Multi-core
                  {ARM} Platforms},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {161--163},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176948},
  doi          = {10.1145/3176258.3176948},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhangNCZDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/OestSDAWW18,
  author       = {Adam Oest and
                  Yeganeh Safaei and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Brad Wardman and
                  Gary Warner},
  title        = {Inside a phisher's mind: Understanding the anti-phishing ecosystem
                  through phishing kit analysis},
  booktitle    = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San
                  Diego, CA, USA, May 15-17, 2018},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ECRIME.2018.8376206},
  doi          = {10.1109/ECRIME.2018.8376206},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/OestSDAWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/MabeyD0A18,
  author       = {Mike Mabey and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Challenges, Opportunities and a Framework for Web Environment Forensics},
  booktitle    = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 3-5, 2018, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {532},
  pages        = {11--33},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99277-8\_2},
  doi          = {10.1007/978-3-319-99277-8\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/MabeyD0A18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ChandramouliBKV18,
  author       = {Sai Prashanth Chandramouli and
                  Pierre{-}Marie Bajan and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Measuring E-mail header injections on the world wide web},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1647--1656},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167308},
  doi          = {10.1145/3167132.3167308},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/CoughlinR0A18,
  author       = {Vu Coughlin and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {EDSGuard: Enforcing Network Security Requirements for Energy Delivery
                  Systems},
  booktitle    = {2018 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg,
                  Denmark, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartGridComm.2018.8587430},
  doi          = {10.1109/SMARTGRIDCOMM.2018.8587430},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/CoughlinR0A18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494},
  doi          = {10.1145/3196494},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018,
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3176258},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the 2018 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3180465},
  timestamp    = {Sun, 18 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2018sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/Ahn18,
  author       = {Gail{-}Joon Ahn},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Discretionary Access Control},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_135},
  doi          = {10.1007/978-1-4614-8265-9\_135},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/Ahn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/TuDZA17,
  author       = {Huahong Tu and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Toward Standardization of Authenticated Caller {ID} Transmission},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {1},
  number       = {3},
  pages        = {30--36},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOMSTD.2017.1700019},
  doi          = {10.1109/MCOMSTD.2017.1700019},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/TuDZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/ChandramouliZDA17,
  author       = {Sai Prashanth Chandramouli and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {E-mail Header Injection Vulnerabilities},
  journal      = {it Inf. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {67},
  year         = {2017},
  url          = {https://doi.org/10.1515/itit-2016-0039},
  doi          = {10.1515/ITIT-2016-0039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/ChandramouliZDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/SenguptaVKDZTA17,
  author       = {Sailik Sengupta and
                  Satya Gautam Vadlamudi and
                  Subbarao Kambhampati and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Marthony Taguinod and
                  Gail{-}Joon Ahn},
  editor       = {Kate Larson and
                  Michael Winikoff and
                  Sanmay Das and
                  Edmund H. Durfee},
  title        = {A Game Theoretic Approach to Strategy Generation for Moving Target
                  Defense in Web Applications},
  booktitle    = {Proceedings of the 16th Conference on Autonomous Agents and MultiAgent
                  Systems, {AAMAS} 2017, S{\~{a}}o Paulo, Brazil, May 8-12, 2017},
  pages        = {178--186},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3091155},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/SenguptaVKDZTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rubio-MedranoLD17,
  author       = {Carlos E. Rubio{-}Medrano and
                  Josephine Lamp and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Hamed Okhravi and
                  Xinming Ou},
  title        = {Mutated Policies: Towards Proactive Attribute-based Defenses for Access
                  Control},
  booktitle    = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS
                  2017, Dallas, TX, USA, October 30, 2017},
  pages        = {39--49},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140549.3140553},
  doi          = {10.1145/3140549.3140553},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Rubio-MedranoLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KyungHTDSZDA17,
  author       = {Sukwha Kyung and
                  Wonkyu Han and
                  Naveen Tiwari and
                  Vaibhav Hemant Dixit and
                  Lakshmi Srinivas and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {HoneyProxy: Design and implementation of next-generation honeynet
                  via {SDN}},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228653},
  doi          = {10.1109/CNS.2017.8228653},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/KyungHTDSZDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/McLaughlinRKYMS17,
  author       = {Niall McLaughlin and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and
                  BooJoong Kang and
                  Suleiman Y. Yerima and
                  Paul Miller and
                  Sakir Sezer and
                  Yeganeh Safaei and
                  Erik Trickel and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Deep Android Malware Detection},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {301--308},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029823},
  doi          = {10.1145/3029806.3029823},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/McLaughlinRKYMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/LampRZA17,
  author       = {Josephine Lamp and
                  Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing
                  Security Requirements},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00012},
  doi          = {10.1109/CIC.2017.00012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/LampRZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DengLHWAZH17,
  author       = {Juan Deng and
                  Hongda Li and
                  Hongxin Hu and
                  Kuang{-}Ching Wang and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Wonkyu Han},
  title        = {On the Safety and Efficiency of Virtual Firewall Elasticity Control},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/safety-and-efficiency-virtual-firewall-elasticity-control/},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DengLHWAZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/ChowdharyDTKHA17,
  author       = {Ankur Chowdhary and
                  Vaibhav Hemant Dixit and
                  Naveen Tiwari and
                  Sukwha Kyung and
                  Dijiang Huang and
                  Gail{-}Joon Ahn},
  title        = {Science {DMZ:} {SDN} based secured cloud testbed},
  booktitle    = {2017 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NFV-SDN.2017.8169868},
  doi          = {10.1109/NFV-SDN.2017.8169868},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/ChowdharyDTKHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LiDHWAZH17,
  author       = {Hongda Li and
                  Juan Deng and
                  Hongxin Hu and
                  Kuang{-}Ching Wang and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Wonkyu Han},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Poster: On the Safety and Efficiency of Virtual Firewall Elasticity
                  Control},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {129--131},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3084166},
  doi          = {10.1145/3078861.3084166},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/LiDHWAZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/VishwamitraLWHC17,
  author       = {Nishant Vishwamitra and
                  Yifang Li and
                  Kevin Wang and
                  Hongxin Hu and
                  Kelly Caine and
                  Gail{-}Joon Ahn},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Towards PII-based Multiparty Access Control for Photo Sharing in Online
                  Social Networks},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3078875},
  doi          = {10.1145/3078861.3078875},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/VishwamitraLWHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HongHLWNMYCA17,
  author       = {Yunfeng Hong and
                  Yongjian Hu and
                  Chun{-}Ming Lai and
                  Shyhtsun Felix Wu and
                  Iulian Neamtiu and
                  Patrick D. McDaniel and
                  Paul L. Yu and
                  Hasan Cam and
                  Gail{-}Joon Ahn},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Defining and Detecting Environment Discrimination in Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {510--529},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_26},
  doi          = {10.1007/978-3-319-78813-5\_26},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/HongHLWNMYCA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn         = {978-1-4503-4523-1},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the {ACM} International Workshop on Security in Software
                  Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY
                  2017, Scottsdale, Arizona, USA, March 24, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3040992},
  doi          = {10.1145/3040992},
  isbn         = {978-1-4503-4908-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MabeyD0A16,
  author       = {Mike Mabey and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {dbling: Identifying extensions installed on encrypted web thin clients},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S55--S65},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.007},
  doi          = {10.1016/J.DIIN.2016.04.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MabeyD0A16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZhaoSAHJH16,
  author       = {Ziming Zhao and
                  Mukund Sankaran and
                  Gail{-}Joon Ahn and
                  Thomas J. Holt and
                  Yiming Jing and
                  Hongxin Hu},
  title        = {Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {32--43},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.46},
  doi          = {10.1109/MSP.2016.46},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZhaoSAHJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JingAHCZ16,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Haehyun Cho and
                  Ziming Zhao},
  title        = {TripleMon: {A} multi-layer security framework for mediating inter-process
                  communication on Android},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {405--426},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160552},
  doi          = {10.3233/JCS-160552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JingAHCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/VadlamudiSTZDAK16,
  author       = {Satya Gautam Vadlamudi and
                  Sailik Sengupta and
                  Marthony Taguinod and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Subbarao Kambhampati},
  editor       = {Catholijn M. Jonker and
                  Stacy Marsella and
                  John Thangarajah and
                  Karl Tuyls},
  title        = {Moving Target Defense for Web Applications using Bayesian Stackelberg
                  Games: (Extended Abstract)},
  booktitle    = {Proceedings of the 2016 International Conference on Autonomous Agents
                  {\&} Multiagent Systems, Singapore, May 9-13, 2016},
  pages        = {1377--1378},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2937168},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/VadlamudiSTZDAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JingADY16,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Adam Doup{\'{e}} and
                  Jeong Hyun Yi},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Checking Intent-based Communication in Android with Intent Space Analysis},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {735--746},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897904},
  doi          = {10.1145/2897845.2897904},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JingADY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HanZDA16,
  author       = {Wonkyu Han and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {HoneyMix: Toward SDN-based Intelligent Honeynet},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2876019.2876022},
  doi          = {10.1145/2876019.2876022},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HanZDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Rubio-MedranoLT16,
  author       = {Carlos E. Rubio{-}Medrano and
                  Josephine Lamp and
                  Marthony Taguinod and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Position Paper: Towards a Moving Target Defense Approach for Attribute-based
                  Access Control},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {68--71},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875499},
  doi          = {10.1145/2875491.2875499},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Rubio-MedranoLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/ModiSPKZDAB16,
  author       = {Ajay Modi and
                  Zhibo Sun and
                  Anupam Panwar and
                  Tejas Khairnar and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Paul Black},
  title        = {Towards Automated Threat Intelligence Fusion},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {408--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.060},
  doi          = {10.1109/CIC.2016.060},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/ModiSPKZDAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/LiaoZDA16,
  author       = {Kevin Liao and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Behind closed doors: measurement and analysis of CryptoLocker ransoms
                  in Bitcoin},
  booktitle    = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto,
                  ON, Canada, June 1-3, 2016},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ECRIME.2016.7487938},
  doi          = {10.1109/ECRIME.2016.7487938},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/LiaoZDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/JangAHK16,
  author       = {Dae{-}il Jang and
                  Gail{-}Joon Ahn and
                  Hyunuk Hwang and
                  Kibom Kim},
  title        = {Understanding Anti-forensic Techniques with Timestamp Manipulation
                  (Invited Paper)},
  booktitle    = {17th {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016},
  pages        = {609--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IRI.2016.94},
  doi          = {10.1109/IRI.2016.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/JangAHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kaleidoscope/TuDZA16,
  author       = {Huahong Tu and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Toward authenticated caller {ID} transmission: The need for a standardized
                  authentication scheme in {Q.731.3} calling line identification presentation},
  booktitle    = {2016 {ITU} Kaleidoscope: ICTs for a Sustainable World, Bangkok, Thailand,
                  November 14-16, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ITU-WT.2016.7805728},
  doi          = {10.1109/ITU-WT.2016.7805728},
  timestamp    = {Wed, 11 Aug 2021 11:51:26 +0200},
  biburl       = {https://dblp.org/rec/conf/kaleidoscope/TuDZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HanHZDAWD16,
  author       = {Wonkyu Han and
                  Hongxin Hu and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn and
                  Kuang{-}Ching Wang and
                  Juan Deng},
  editor       = {X. Sean Wang and
                  Lujo Bauer and
                  Florian Kerschbaum},
  title        = {State-aware Network Access Management for Software-Defined Networks},
  booktitle    = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2914642.2914643},
  doi          = {10.1145/2914642.2914643},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HanHZDAWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TuDZA16,
  author       = {Huahong Tu and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {SoK: Everyone Hates Robocalls: {A} Survey of Techniques Against Telephone
                  Spam},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {320--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.27},
  doi          = {10.1109/SP.2016.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TuDZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016sdn-nfv,
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2876019},
  isbn         = {978-1-4503-4078-6},
  timestamp    = {Tue, 15 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016sdn-nfv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VadlamudiSKTZDA16,
  author       = {Satya Gautam Vadlamudi and
                  Sailik Sengupta and
                  Subbarao Kambhampati and
                  Marthony Taguinod and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Moving Target Defense for Web Applications using Bayesian Stackelberg
                  Games},
  journal      = {CoRR},
  volume       = {abs/1602.07024},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.07024},
  eprinttype    = {arXiv},
  eprint       = {1602.07024},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VadlamudiSKTZDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YiRA15,
  author       = {Jeong Hyun Yi and
                  Kyung Hyune Rhee and
                  Gail{-}Joon Ahn},
  title        = {Preface - {WISA} 2014},
  journal      = {Comput. Secur.},
  volume       = {52},
  pages        = {250},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.05.008},
  doi          = {10.1016/J.COSE.2015.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YiRA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eetcc/Rubio-MedranoAS15,
  author       = {Carlos E. Rubio{-}Medrano and
                  Gail{-}Joon Ahn and
                  Karsten Sohr},
  title        = {Achieving Security Assurance with Assertion-based Application Construction},
  journal      = {{EAI} Endorsed Trans. Collab. Comput.},
  volume       = {1},
  number       = {6},
  pages        = {e3},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.21-12-2015.150819},
  doi          = {10.4108/EAI.21-12-2015.150819},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eetcc/Rubio-MedranoAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JingAZH15,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Hongxin Hu},
  title        = {Towards Automated Risk Assessment and Mitigation of Mobile Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {571--584},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2366457},
  doi          = {10.1109/TDSC.2014.2366457},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JingAZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoAH15,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Picture Gesture Authentication: Empirical Analysis, Automated Attacks,
                  and Scheme Evaluation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {14:1--14:37},
  year         = {2015},
  url          = {https://doi.org/10.1145/2701423},
  doi          = {10.1145/2701423},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaassAG15,
  author       = {Jon C. Haass and
                  Gail{-}Joon Ahn and
                  Frank Grimmelmann},
  editor       = {Indrajit Ray and
                  Tomas Sander and
                  Moti Yung},
  title        = {{ACTRA:} {A} Case Study for Threat Information Sharing},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {23--26},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808128.2808135},
  doi          = {10.1145/2808128.2808135},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaassAG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/Riad0HA15,
  author       = {Khaled Riad and
                  Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {{AR-ABAC:} {A} New Attribute Based Access Control Model Supporting
                  Attribute-Rules for Cloud Computing},
  booktitle    = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
                  Hangzhou, China, October 27-30, 2015},
  pages        = {28--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIC.2015.38},
  doi          = {10.1109/CIC.2015.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/Riad0HA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PaxtonJRAMH15,
  author       = {Napoleon Paxton and
                  Dae{-}il Jang and
                  Stephen Russell and
                  Gail{-}Joon Ahn and
                  Ira S. Moskowitz and
                  Paul Hyden},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Utilizing Network Science and Honeynets for Software Induced Cyber
                  Incident Analysis},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {5244--5252},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.619},
  doi          = {10.1109/HICSS.2015.619},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/PaxtonJRAMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/TaguinodDZA15,
  author       = {Marthony Taguinod and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Toward a Moving Target Defense for Web Applications},
  booktitle    = {2015 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015},
  pages        = {510--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IRI.2015.84},
  doi          = {10.1109/IRI.2015.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/TaguinodDZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/DengHLPWABP15,
  author       = {Juan Deng and
                  Hongxin Hu and
                  Hongda Li and
                  Zhizhong Pan and
                  Kuang{-}Ching Wang and
                  Gail{-}Joon Ahn and
                  Jun Bi and
                  Younghee Park},
  title        = {VNGuard: An {NFV/SDN} combination framework for provisioning and managing
                  virtual firewalls},
  booktitle    = {{IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2015, San Francisco, CA, USA, November
                  18-21, 2015},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NFV-SDN.2015.7387414},
  doi          = {10.1109/NFV-SDN.2015.7387414},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/DengHLPWABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoZD15,
  author       = {Carlos E. Rubio{-}Medrano and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Federated Access Management for Collaborative Network Environments:
                  Framework and Case Study},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752977},
  doi          = {10.1145/2752952.2752977},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015asia,
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2714576},
  isbn         = {978-1-4503-3245-3},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2015asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/0001MHAH14,
  author       = {Yan Zhu and
                  Di Ma and
                  Changjun Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Secure and efficient random functions with variable-length output},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {45},
  pages        = {121--133},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.07.033},
  doi          = {10.1016/J.JNCA.2014.07.033},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JingZAH14,
  author       = {Yiming Jing and
                  Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Morpheus: automatically generating heuristics to detect Android emulators},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {216--225},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664250},
  doi          = {10.1145/2664243.2664250},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JingZAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhnD14,
  author       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{WPES} 2014: 13th Workshop on Privacy in the Electronic Society},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1546--1547},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660383},
  doi          = {10.1145/2660267.2660383},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhnD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JingAZH14,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Hongxin Hu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {RiskMon: continuous and automated risk assessment of mobile applications},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557549},
  doi          = {10.1145/2557547.2557549},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/JingAZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/PaxtonJMAR14,
  author       = {Napoleon Paxton and
                  Dae{-}il Jang and
                  Ira S. Moskowitz and
                  Gail{-}Joon Ahn and
                  Stephen Russell},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {Discovering and analyzing deviant communities: Methods and experiments},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {163--170},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257262},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257262},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/PaxtonJMAR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/Rubio-MedranoAS14,
  author       = {Carlos E. Rubio{-}Medrano and
                  Gail{-}Joon Ahn and
                  Karsten Sohr},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {Achieving security assurance with assertion-based application construction},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {503--510},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257691},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257691},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/Rubio-MedranoAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HanHA14,
  author       = {Wonkyu Han and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {{LPM:} Layered Policy Management for Software-Defined Networks},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {356--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_23},
  doi          = {10.1007/978-3-662-43936-4\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HanHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/DSouzaAT14,
  author       = {Clinton D'Souza and
                  Gail{-}Joon Ahn and
                  Marthony Taguinod},
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {Policy-driven security management for fog computing: Preliminary framework
                  and a case study},
  booktitle    = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IRI.2014.7051866},
  doi          = {10.1109/IRI.2014.7051866},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/DSouzaAT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ons/HuAHZ14,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Wonkyu Han and
                  Ziming Zhao},
  editor       = {Rob Sherwood},
  title        = {Towards a Reliable {SDN} Firewall},
  booktitle    = {Open Networking Summit 2014 - Research Track, {ONS} 2014, Santa Clara,
                  CA, USA, March 2-4, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/ons2014/technical-sessions/presentation/hu},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ons/HuAHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HuAZY14,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ziming Zhao and
                  Dejun Yang},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Game theoretic analysis of multiparty access control in online social
                  networks},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613097},
  doi          = {10.1145/2613087.2613097},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HuAZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/HuHAZ14,
  author       = {Hongxin Hu and
                  Wonkyu Han and
                  Gail{-}Joon Ahn and
                  Ziming Zhao},
  editor       = {Aditya Akella and
                  Albert G. Greenberg},
  title        = {{FLOWGUARD:} building robust firewalls for software-defined networks},
  booktitle    = {Proceedings of the third workshop on Hot topics in software defined
                  networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2620728.2620749},
  doi          = {10.1145/2620728.2620749},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/HuHAZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn         = {978-1-4503-2957-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014aisec,
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2666652},
  isbn         = {978-1-4503-3153-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014ccsw,
  editor       = {Gail{-}Joon Ahn and
                  Alina Oprea and
                  Reihaneh Safavi{-}Naini},
  title        = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing
                  Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664168},
  doi          = {10.1145/2664168},
  isbn         = {978-1-4503-3239-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014trusted,
  editor       = {Gail{-}Joon Ahn and
                  Frederik Armknecht and
                  Jorge Guajardo},
  title        = {Proceedings of the 4th International Workshop on Trustworthy Embedded
                  Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666141},
  doi          = {10.1145/2666141},
  isbn         = {978-1-4503-3149-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014trusted.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014wiscs,
  editor       = {Gail{-}Joon Ahn and
                  Tomas Sander},
  title        = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663876},
  doi          = {10.1145/2663876},
  isbn         = {978-1-4503-3151-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2014,
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2665943},
  isbn         = {978-1-4503-3148-7},
  timestamp    = {Fri, 20 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SinghalCGSKAB13,
  author       = {Mukesh Singhal and
                  Santosh Chandrasekhar and
                  Tingjian Ge and
                  Ravi S. Sandhu and
                  Ram Krishnan and
                  Gail{-}Joon Ahn and
                  Elisa Bertino},
  title        = {Collaboration in Multicloud Computing Environments: Framework and
                  Security Issues},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {76--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.46},
  doi          = {10.1109/MC.2013.46},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TeoA13,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  title        = {Extensible policy framework for heterogeneous network environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {251--274},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058210},
  doi          = {10.1504/IJICS.2013.058210},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TeoA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/XuSA13,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  title        = {Visualization-based policy analysis for SELinux: framework and user
                  study},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {155--171},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0180-7},
  doi          = {10.1007/S10207-012-0180-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/XuSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK13,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  title        = {Discovery and Resolution of Anomalies in Web Access Control Policies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {341--354},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.18},
  doi          = {10.1109/TDSC.2013.18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuAHMW13,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Di Ma and
                  Shan{-}Biao Wang},
  title        = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based
                  on Role-Key Hierarchy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {12},
  pages        = {2138--2153},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2287858},
  doi          = {10.1109/TIFS.2013.2287858},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/HuAJ13,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jan Jorgensen},
  title        = {Multiparty Access Control for Online Social Networks: Model and Mechanisms},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {25},
  number       = {7},
  pages        = {1614--1627},
  year         = {2013},
  url          = {https://doi.org/10.1109/TKDE.2012.97},
  doi          = {10.1109/TKDE.2012.97},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/HuAJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhuAHYAH13,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau and
                  Ho G. An and
                  Changjun Hu},
  title        = {Dynamic Audit Services for Outsourced Storages in Clouds},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {227--238},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSC.2011.51},
  doi          = {10.1109/TSC.2011.51},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhuAHYAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhaoA13,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {Using instruction sequence abstraction for shellcode detection and
                  attribution},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {323--331},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682722},
  doi          = {10.1109/CNS.2013.6682722},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhaoA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/PaglieraniMA13,
  author       = {Justin Paglierani and
                  Mike Mabey and
                  Gail{-}Joon Ahn},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Towards comprehensive and collaborative forensics on email evidence},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {11--20},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254125},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254125},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/PaglieraniMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/Rubio-MedranoDA13,
  author       = {Carlos E. Rubio{-}Medrano and
                  Clinton D'Souza and
                  Gail{-}Joon Ahn},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Supporting secure collaborations with attribute-based access control},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {525--530},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254168},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254168},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/Rubio-MedranoDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Rubio-MedranoAS13,
  author       = {Carlos E. Rubio{-}Medrano and
                  Gail{-}Joon Ahn and
                  Karsten Sohr},
  title        = {Verifying Access Control Properties with Design by Contract: Framework
                  and Lessons Learned},
  booktitle    = {37th Annual {IEEE} Computer Software and Applications Conference,
                  {COMPSAC} 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSAC.2013.7},
  doi          = {10.1109/COMPSAC.2013.7},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/Rubio-MedranoAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HanMA13,
  author       = {Wonkyu Han and
                  Mike Mabey and
                  Gail{-}Joon Ahn},
  title        = {Simulation-based validation for smart grid environments},
  booktitle    = {{IEEE} 14th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2013, San Francisco, CA, USA, August 14-16, 2013},
  pages        = {14--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IRI.2013.6642448},
  doi          = {10.1109/IRI.2013.6642448},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/HanMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/HanMAK13,
  author       = {Wonkyu Han and
                  Mike Mabey and
                  Gail{-}Joon Ahn and
                  Tae Sung Kim},
  editor       = {Thouraya Bouabana{-}Tebibel and
                  Stuart H. Rubin},
  title        = {Simulation-Based Validation for Smart Grid Environments: Framework
                  and Experimental Results},
  booktitle    = {Integration of Reusable Systems [extended versions of the best papers
                  which were presented at {IEEE} International Conference on Information
                  Reuse and Integration and {IEEE} International Workshop on Formal
                  Methods Integration, San Francisco, CA, USA, August 2013]},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {263},
  pages        = {27--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04717-1\_2},
  doi          = {10.1007/978-3-319-04717-1\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/HanMAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WuZASX13,
  author       = {Ruoyu Wu and
                  Xinwen Zhang and
                  Gail{-}Joon Ahn and
                  Hadi Sharifi and
                  Haiyong Xie},
  title        = {ACaaS: Access Control as a Service for IaaS Cloud},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {423--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.66},
  doi          = {10.1109/SOCIALCOM.2013.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/WuZASX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhaoASH13,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Jeong{-}Jin Seo and
                  Hongxin Hu},
  editor       = {Samuel T. King},
  title        = {On the Security of Picture Gesture Authentication},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {383--398},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/zhao},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhaoASH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhuYHAZ12,
  author       = {Yan Zhu and
                  Mengyang Yu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Hong{-}Jia Zhao},
  title        = {Efficient construction of provably secure steganography under ordinary
                  covert channels},
  journal      = {Sci. China Inf. Sci.},
  volume       = {55},
  number       = {7},
  pages        = {1639--1649},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11432-012-4598-3},
  doi          = {10.1007/S11432-012-4598-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhuYHAZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShehabSAK12,
  author       = {Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Gail{-}Joon Ahn and
                  Irini Kokkinou},
  title        = {Access control for online social networks third party applications},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {8},
  pages        = {897--911},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.07.008},
  doi          = {10.1016/J.COSE.2012.07.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShehabSAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/ZhuWHAM12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Di Ma},
  title        = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {165--198},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218843012410018},
  doi          = {10.1142/S0218843012410018},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmam/WuAH12,
  author       = {Ruoyu Wu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Towards HIPAA-Compliant Healthcare Systems in Cloud Computing},
  journal      = {Int. J. Comput. Model. Algorithms Medicine},
  volume       = {3},
  number       = {2},
  pages        = {1--22},
  year         = {2012},
  url          = {https://doi.org/10.4018/jcmam.2012040101},
  doi          = {10.4018/JCMAM.2012040101},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmam/WuAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/SohrKGHA12,
  author       = {Karsten Sohr and
                  Mirco Kuhlmann and
                  Martin Gogolla and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {Comprehensive two-level analysis of role-based delegation and revocation
                  policies with {UML} and {OCL}},
  journal      = {Inf. Softw. Technol.},
  volume       = {54},
  number       = {12},
  pages        = {1396--1417},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.infsof.2012.06.008},
  doi          = {10.1016/J.INFSOF.2012.06.008},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/SohrKGHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AhnJS12,
  author       = {Gail{-}Joon Ahn and
                  Jing Jin and
                  Mohamed Shehab},
  title        = {Policy-driven role-based access management for ad-hoc collaboration},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {223--257},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0446},
  doi          = {10.3233/JCS-2012-0446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AhnJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhuHAY12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Stephen S. Yau},
  title        = {Efficient audit service outsourcing for data integrity in clouds},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {5},
  pages        = {1083--1095},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.12.024},
  doi          = {10.1016/J.JSS.2011.12.024},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhuHAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ClaycombSA12,
  author       = {William R. Claycomb and
                  Dongwan Shin and
                  Gail{-}Joon Ahn},
  title        = {Enhancing directory virtualization to detect insider activity},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {8},
  pages        = {873--886},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.362},
  doi          = {10.1002/SEC.362},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ClaycombSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoHAW12,
  author       = {Ziming Zhao and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ruoyu Wu},
  title        = {Risk-Aware Mitigation for {MANET} Routing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {250--260},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.51},
  doi          = {10.1109/TDSC.2011.51},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuAK12,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  title        = {Detecting and Resolving Firewall Policy Anomalies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {318--331},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.20},
  doi          = {10.1109/TDSC.2012.20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZHAS12,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jean{-}Pierre Seifert},
  title        = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {429--442},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.61},
  doi          = {10.1109/TDSC.2011.61},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhuHAY12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Mengyang Yu},
  title        = {Cooperative Provable Data Possession for Integrity Verification in
                  Multicloud Storage},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {12},
  pages        = {2231--2244},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2012.66},
  doi          = {10.1109/TPDS.2012.66},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhuHAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Mengyang Yu and
                  Hong{-}Jia Zhao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Comparison-based encryption for fine-grained access control in clouds},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133614},
  doi          = {10.1145/2133601.2133614},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/WuAH12,
  author       = {Ruoyu Wu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Secure sharing of electronic health records in clouds},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {711--718},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250497},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250497},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/WuAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhaoAHM12,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Deepinder Mahi},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {SocialImpact: Systematic Analysis of Underground Social Dynamics},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {877--894},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_50},
  doi          = {10.1007/978-3-642-33167-1\_50},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhaoAHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HuAJ12,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jan Jorgensen},
  title        = {Enabling Collaborative data sharing in Google+},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {720--725},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503198},
  doi          = {10.1109/GLOCOM.2012.6503198},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HuAJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuWMHA12,
  author       = {Yan Zhu and
                  Shan{-}Biao Wang and
                  Di Ma and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile
                  devices},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {949--954},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503235},
  doi          = {10.1109/GLOCOM.2012.6503235},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihi/WuAH12,
  author       = {Ruoyu Wu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Gang Luo and
                  Jiming Liu and
                  Christopher C. Yang},
  title        = {Towards HIPAA-compliant healthcare systems},
  booktitle    = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami,
                  FL, USA, January 28-30, 2012},
  pages        = {593--602},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2110363.2110429},
  doi          = {10.1145/2110363.2110429},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ihi/WuAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhuHAHW12,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Dijiang Huang and
                  Shan{-}Biao Wang},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Towards temporal access control in cloud computing},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2576--2580},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195656},
  doi          = {10.1109/INFCOM.2012.6195656},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhuHAHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JingAH12,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Model-Based Conformance Testing for Android},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_1},
  doi          = {10.1007/978-3-642-34117-5\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JingAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhuWHAH11,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Zero-knowledge proofs of retrievability},
  journal      = {Sci. China Inf. Sci.},
  volume       = {54},
  number       = {8},
  pages        = {1608--1617},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11432-011-4293-9},
  doi          = {10.1007/S11432-011-4293-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhuWHAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinAHCZ11,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Michael J. Covington and
                  Xinwen Zhang},
  title        = {Patient-centric authorization framework for electronic healthcare
                  services},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {2-3},
  pages        = {116--127},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.09.001},
  doi          = {10.1016/J.COSE.2010.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinAHCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JinA11,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn},
  title        = {Assured resource sharing in Grid environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {215--233},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040181},
  doi          = {10.1504/IJICS.2011.040181},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JinA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/AhnSS11,
  author       = {Gail{-}Joon Ahn and
                  Mohamed Shehab and
                  Anna Cinzia Squicciarini},
  title        = {Security and Privacy in Social Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {15},
  number       = {3},
  pages        = {10--12},
  year         = {2011},
  url          = {https://doi.org/10.1109/MIC.2011.66},
  doi          = {10.1109/MIC.2011.66},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/AhnSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhuHAWW11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Huaixi Wang and
                  Shan{-}Biao Wang},
  title        = {Provably Secure Role-Based Encryption with Revocation Mechanism},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {26},
  number       = {4},
  pages        = {697--710},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11390-011-1169-9},
  doi          = {10.1007/S11390-011-1169-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhuHAWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuAJ11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jan Jorgensen},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Detecting and resolving privacy conflicts for collaborative data sharing
                  in online social networks},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {103--112},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076747},
  doi          = {10.1145/2076732.2076747},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HuAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuHAGC11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Xiaorui Gong and
                  Shimin Chen},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: temporal attribute-based encryption in clouds},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {881--884},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093517},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuHAGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhuHAHC11,
  author       = {Yan Zhu and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Yujing Han and
                  Shimin Chen},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {Collaborative integrity verification in hybrid clouds},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {191--200},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247089},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247089},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhuHAHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/HuAK11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {Ontology-based policy anomaly management for autonomic computing},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {487--494},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247119},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247119},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/HuAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/PaxtonAS11,
  author       = {Napoleon Paxton and
                  Gail{-}Joon Ahn and
                  Mohamed Shehab},
  title        = {MasterBlaster: Identifying Influential Players in Botnet Transactions},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {413--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.61},
  doi          = {10.1109/COMPSAC.2011.61},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/PaxtonAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuA11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Yingjiu Li},
  title        = {Multiparty Authorization Framework for Data Sharing in Online Social
                  Networks},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_5},
  doi          = {10.1007/978-3-642-22348-8\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhaoAH11,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Examining Social Dynamics for Countering Botnet Attacks},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6134468},
  doi          = {10.1109/GLOCOM.2011.6134468},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhaoAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AhnS11,
  author       = {Gail{-}Joon Ahn and
                  Pradeep Sekar},
  title        = {Ontology-Based Risk Evaluation in User-Centric Identity Management},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5962948},
  doi          = {10.1109/ICC.2011.5962948},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AhnS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/Ahn11,
  author       = {Gail{-}Joon Ahn},
  title        = {Securing and utilizing social dynamics},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada,
                  {USA}},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IRI.2011.6009507},
  doi          = {10.1109/IRI.2011.6009507},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/Ahn11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/MabeyA11,
  author       = {Mike Mabey and
                  Gail{-}Joon Ahn},
  title        = {Towards collaborative forensics: Preliminary framework},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada,
                  {USA}},
  pages        = {94--99},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IRI.2011.6009527},
  doi          = {10.1109/IRI.2011.6009527},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/MabeyA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZhuWHAHY11,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Dynamic audit services for integrity verification of outsourced storages
                  in clouds},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {1550--1557},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982514},
  doi          = {10.1145/1982185.1982514},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ZhuWHAHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HuAK11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  editor       = {Ruth Breu and
                  Jason Crampton and
                  Jorge Lobo},
  title        = {Anomaly discovery and resolution in web access control policies},
  booktitle    = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998441.1998472},
  doi          = {10.1145/1998441.1998472},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HuAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/ZhaoAH11,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Martin Pinzger and
                  Denys Poshyvanyk and
                  Jim Buckley},
  title        = {Automatic Extraction of Secrets from Malware},
  booktitle    = {18th Working Conference on Reverse Engineering, {WCRE} 2011, Limerick,
                  Ireland, October 17-20, 2011},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WCRE.2011.27},
  doi          = {10.1109/WCRE.2011.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/ZhaoAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {Security and Privacy Challenges in Cloud Computing Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {24--31},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.186},
  doi          = {10.1109/MSP.2010.186},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/HuA10,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {Constructing Authorization Systems Using Assurance Management Framework},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {40},
  number       = {4},
  pages        = {396--405},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSMCC.2010.2047856},
  doi          = {10.1109/TSMCC.2010.2047856},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/HuA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuAHW10,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Huaixi Wang},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Cryptographic role-based security mechanisms based on role-key hierarchy},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {314--319},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755728},
  doi          = {10.1145/1755688.1755728},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuAHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuWHAHY10,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Efficient provable data possession for hybrid clouds},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {756--758},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866421},
  doi          = {10.1145/1866307.1866421},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuWHAHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/WuAHS10,
  author       = {Ruoyu Wu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Mukesh Singhal},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {Information flow control in cloud computing},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--7},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.trustcol.2010.1},
  doi          = {10.4108/ICST.TRUSTCOL.2010.1},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/WuAHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhuHWHA10,
  author       = {Yan Zhu and
                  Zexing Hu and
                  Huaixi Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {A collaborative framework for privacy protection in online social
                  networks},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.52},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.52},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhuHWHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/AhnHLM10,
  author       = {Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Joohyung Lee and
                  Yunsong Meng},
  editor       = {Sheikh Iqbal Ahamed and
                  Doo{-}Hwan Bae and
                  Sung Deok Cha and
                  Carl K. Chang and
                  Rajesh Subramanyan and
                  W. Eric Wong and
                  Hen{-}I Yang},
  title        = {Representing and Reasoning about Web Access Control Policies},
  booktitle    = {Proceedings of the 34th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2010, Seoul, Korea, 19-23 July
                  2010},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSAC.2010.20},
  doi          = {10.1109/COMPSAC.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/AhnHLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {SecureCloud: Towards a Comprehensive Security Framework for Cloud
                  Computing Environments},
  booktitle    = {Workshop Proceedings of the 34th Annual {IEEE} International Computer
                  Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul,
                  Korea, 19-23 July 2010},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSACW.2010.74},
  doi          = {10.1109/COMPSACW.2010.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuAHZS10,
  author       = {Wenjuan Xu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {DR@FT: Efficient Remote Attestation Framework for Dynamic Systems},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_12},
  doi          = {10.1007/978-3-642-15497-3\_12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/XuAHZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhaoHAW10,
  author       = {Ziming Zhao and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ruoyu Wu},
  title        = {Risk-Aware Response for Mitigating {MANET} Routing Attacks},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683548},
  doi          = {10.1109/GLOCOM.2010.5683548},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhaoHAW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/HuAK10,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Ketan Kulkarni},
  editor       = {Tony Sager and
                  Gail{-}Joon Ahn and
                  Krishna Kant and
                  Heather Richter Lipford},
  title        = {{FAME:} a firewall anomaly management environment},
  booktitle    = {3rd {ACM} Workshop on Assurable and Usable Security Configuration,
                  SafeConfig 2010, Chicago, IL, USA, October 4, 2010},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866898.1866902},
  doi          = {10.1145/1866898.1866902},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/HuAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2010,
  editor       = {Tony Sager and
                  Gail{-}Joon Ahn and
                  Krishna Kant and
                  Heather Richter Lipford},
  title        = {3rd {ACM} Workshop on Assurable and Usable Security Configuration,
                  SafeConfig 2010, Chicago, IL, USA, October 4, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1866898},
  isbn         = {978-1-4503-0093-3},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuAHW10,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Huaixi Wang},
  title        = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuWHAHY10,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  title        = {Efficient provable data possession for hybrid clouds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuHWHA10,
  author       = {Yan Zhu and
                  Zexing Hu and
                  Huaixi Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {A Collaborative Framework for Privacy Protection in Online Social
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/AhnHJ09,
  author       = {Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Jing Jin},
  title        = {Security-Enhanced OSGi Service Environments},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {39},
  number       = {5},
  pages        = {562--571},
  year         = {2009},
  url          = {https://doi.org/10.1109/TSMCC.2009.2020437},
  doi          = {10.1109/TSMCC.2009.2020437},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/AhnHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ShinLCA09,
  author       = {Dongwan Shin and
                  Rodrigo Lopes and
                  William R. Claycomb and
                  Gail{-}Joon Ahn},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {A Framework for Enabling User-Controlled Persona in Online Social
                  Networks},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 1},
  pages        = {292--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.46},
  doi          = {10.1109/COMPSAC.2009.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ShinLCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuZA09,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Gail{-}Joon Ahn},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Towards System Integrity Protection with Graph-Based Policy Analysis},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_5},
  doi          = {10.1007/978-3-642-03007-9\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/XuZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/JinA09,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Stephen S. Yau and
                  Osvaldo Gervasi and
                  Byeong{-}Ho Kang},
  title        = {Authorization Framework for Resource Sharing in Grid Environments},
  booktitle    = {Grid and Distributed Computing - International Conference, {GDC} 2009,
                  Held as Part of the Future Generation Information Technology Conferences,
                  {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {63},
  pages        = {148--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10549-4\_18},
  doi          = {10.1007/978-3-642-10549-4\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/JinA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AhnKS09,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko and
                  Mohamed Shehab},
  title        = {Privacy-Enhanced User-Centric Identity Management},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199363},
  doi          = {10.1109/ICC.2009.5199363},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AhnKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JinAHCZ09,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Michael J. Covington and
                  Xinwen Zhang},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Patient-centric authorization framework for sharing electronic health
                  records},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542228},
  doi          = {10.1145/1542207.1542228},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/JinAHCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/Ahn09,
  author       = {Gail{-}Joon Ahn},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Discretionary Access Control},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {864--866},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_135},
  doi          = {10.1007/978-0-387-39940-9\_135},
  timestamp    = {Sun, 02 Jun 2019 21:10:27 +0200},
  biburl       = {https://dblp.org/rec/reference/db/Ahn09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HongAX08,
  author       = {Seng{-}Phil Hong and
                  Gail{-}Joon Ahn and
                  Wenjuan Xu},
  title        = {Access Control Management for {SCADA} Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {10},
  pages        = {2449--2457},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.10.2449},
  doi          = {10.1093/IETISY/E91-D.10.2449},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HongAX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SohrDAG08,
  author       = {Karsten Sohr and
                  Michael Drouineaud and
                  Gail{-}Joon Ahn and
                  Martin Gogolla},
  title        = {Analyzing and Managing Role-Based Access Control Policies},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {20},
  number       = {7},
  pages        = {924--939},
  year         = {2008},
  url          = {https://doi.org/10.1109/TKDE.2008.28},
  doi          = {10.1109/TKDE.2008.28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SohrDAG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SohrMBA08,
  author       = {Karsten Sohr and
                  Tanveer Mustafa and
                  Xinyu Bao and
                  Gail{-}Joon Ahn},
  title        = {Enforcing Role-Based Access Control Policies in Web Services with
                  {UML} and {OCL}},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.35},
  doi          = {10.1109/ACSAC.2008.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SohrMBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinACZ08,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Michael J. Covington and
                  Xinwen Zhang},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Access Control Model for Sharing Composite Electronic Health Records},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {340--354},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_25},
  doi          = {10.1007/978-3-642-03354-4\_25},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinACZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/IwaiharaMAY08,
  author       = {Mizuho Iwaihara and
                  Kohei Murakami and
                  Gail{-}Joon Ahn and
                  Masatoshi Yoshikawa},
  editor       = {Qing Li and
                  Stefano Spaccapietra and
                  Eric S. K. Yu and
                  Antoni Oliv{\'{e}}},
  title        = {Risk Evaluation for Personal Identity Management Based on Privacy
                  Attribute Ontology},
  booktitle    = {Conceptual Modeling - {ER} 2008, 27th International Conference on
                  Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5231},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87877-3\_15},
  doi          = {10.1007/978-3-540-87877-3\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/IwaiharaMAY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftdcs/AhnHJ08,
  author       = {Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Jing Jin},
  title        = {Towards Role-Based Authorization for OSGi Service Environments},
  booktitle    = {12th {IEEE} International Workshop on Future Trends of Distributed
                  Computing Systems, {FTDCS} 2008, Kunming, China, October 21-23, 2008},
  pages        = {23--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FTDCS.2008.43},
  doi          = {10.1109/FTDCS.2008.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ftdcs/AhnHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ShehabSA08,
  author       = {Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Gail{-}Joon Ahn},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Beyond User-to-User Access Control for Online Social Networks},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_12},
  doi          = {10.1007/978-3-540-88625-9\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ShehabSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/AhnXZ08,
  author       = {Gail{-}Joon Ahn and
                  Wenjuan Xu and
                  Xinwen Zhang},
  title        = {Systematic Policy Analysis for High-Assurance Services in SELinux},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.18},
  doi          = {10.1109/POLICY.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/AhnXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuSA08,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Visualization based policy analysis: case study in SELinux},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377863},
  doi          = {10.1145/1377836.1377863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/XuSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HuA08,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Enabling verification and conformance testing for access control model},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377867},
  doi          = {10.1145/1377836.1377867},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HuA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AhnKS08,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko and
                  Mohamed Shehab},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Portable User-Centric Identity Management},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_37},
  doi          = {10.1007/978-0-387-09699-5\_37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AhnKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnMH07,
  author       = {Gail{-}Joon Ahn and
                  Badrinath Mohan and
                  Seng{-}Phil Hong},
  title        = {Towards secure information sharing using role-based delegation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {42--59},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.004},
  doi          = {10.1016/J.JNCA.2005.08.004},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhnMH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sopr/LeeGA07,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Certification process artifacts defined as measurable units for software
                  assurance},
  journal      = {Softw. Process. Improv. Pract.},
  volume       = {12},
  number       = {2},
  pages        = {165--189},
  year         = {2007},
  url          = {https://doi.org/10.1002/spip.313},
  doi          = {10.1002/SPIP.313},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sopr/LeeGA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ahn07,
  author       = {Gail{-}Joon Ahn},
  title        = {Guest editorial: Special issue on access control models and technologies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210263.1216576},
  doi          = {10.1145/1210263.1216576},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ahn07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/ChuABDKYY07,
  author       = {Bei{-}tseng Chu and
                  Gail{-}Joon Ahn and
                  Steven Blanchard and
                  James Deese and
                  Richard Kelly and
                  Huiming Yu and
                  Ashika Young},
  title        = {Collegiate Cyber Game Design Criteria and Participation},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {1036--1041},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.80},
  doi          = {10.1109/ICIS.2007.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/ChuABDKYY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TeoA07,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Managing heterogeneous network environments using an extensible policy
                  framework},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {362--364},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229328},
  doi          = {10.1145/1229285.1229328},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TeoA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinASH07,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Mohamed Shehab and
                  Hongxin Hu},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {Towards trust-aware access management for ad-hoc collaborations},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553807},
  doi          = {10.1109/COLCOM.2007.4553807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinASH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/AhnK07,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {User-centric privacy management for federated identity management},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {187--195},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553829},
  doi          = {10.1109/COLCOM.2007.4553829},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/AhnK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/PaxtonAC07,
  author       = {Napoleon Paxton and
                  Gail{-}Joon Ahn and
                  Bill Chu},
  title        = {Towards Practical Framework for Collecting and Analyzing Network-Centric
                  Attacks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada,
                  {USA}},
  pages        = {73--78},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IRI.2007.4296600},
  doi          = {10.1109/IRI.2007.4296600},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/PaxtonAC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/AhnG07,
  author       = {Gail{-}Joon Ahn and
                  Dhruv Gami},
  title        = {Enabling Role-Based Delegation and Revocation on Security-Enhanced
                  Linux},
  booktitle    = {Proceedings of the 12th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2007), July 1-4, Aveiro, Portugal},
  pages        = {865--870},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCC.2007.4381574},
  doi          = {10.1109/ISCC.2007.4381574},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/AhnG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/TeoA07,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  title        = {Towards Effective Security Policy Management for Heterogeneous Network
                  Environments},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {241--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.44},
  doi          = {10.1109/POLICY.2007.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/TeoA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AhnH07,
  author       = {Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Towards realizing a formal {RBAC} model in real systems},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {215--224},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266875},
  doi          = {10.1145/1266840.1266875},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/AhnH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2007,
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0},
  doi          = {10.1007/978-3-540-73538-0},
  isbn         = {978-3-540-73533-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LeeMGYA06,
  author       = {Seok Won Lee and
                  Divya Muthurajan and
                  Robin A. Gandhi and
                  Deepak S. Yavagal and
                  Gail{-}Joon Ahn},
  title        = {Building Decision Support Problem Domain Ontology from Natural Language
                  Requirements for Software Assurance},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {16},
  number       = {6},
  pages        = {851--884},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0218194006003051},
  doi          = {10.1142/S0218194006003051},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/LeeMGYA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinA06,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {Towards Secure Information Sharing and Management in Grid Environments},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361892},
  doi          = {10.1109/COLCOM.2006.361892},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/JinA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbtw/JinAS06,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Mukesh Singhal},
  editor       = {Torsten Grust and
                  Hagen H{\"{o}}pfner and
                  Arantza Illarramendi and
                  Stefan Jablonski and
                  Marco Mesiti and
                  Sascha M{\"{u}}ller and
                  Paula{-}Lavinia Patranjan and
                  Kai{-}Uwe Sattler and
                  Myra Spiliopoulou and
                  Jef Wijsen},
  title        = {ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative
                  Sharing},
  booktitle    = {Current Trends in Database Technology - {EDBT} 2006, {EDBT} 2006 Workshops
                  PhD, DataX, IIDB, IIHA, ICSNW, QLQP, PIM, PaRMA, and Reactivity on
                  the Web, Munich, Germany, March 26-31, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4254},
  pages        = {724--740},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11896548\_55},
  doi          = {10.1007/11896548\_55},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edbtw/JinAS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGMYA06,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Divya Muthurajan and
                  Deepak S. Yavagal and
                  Gail{-}Joon Ahn},
  editor       = {Danilo Bruschi and
                  Bart De Win and
                  Mattia Monga},
  title        = {Building problem domain ontology from security requirements in regulatory
                  documents},
  booktitle    = {Proceedings of the 2006 international workshop on Software engineering
                  for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1137627.1137635},
  doi          = {10.1145/1137627.1137635},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LeeGMYA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JinA06,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Role-based access management for ad-hoc collaborative sharing},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {200--209},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133086},
  doi          = {10.1145/1133058.1133086},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/JinA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/ShinA05,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn},
  title        = {Role-based privilege and trust management},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {20},
  number       = {6},
  year         = {2005},
  timestamp    = {Tue, 20 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/ShinA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ToloneAPH05,
  author       = {William J. Tolone and
                  Gail{-}Joon Ahn and
                  Tanusree Pai and
                  Seng{-}Phil Hong},
  title        = {Access control in collaborative systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {37},
  number       = {1},
  pages        = {29--41},
  year         = {2005},
  url          = {https://doi.org/10.1145/1057977.1057979},
  doi          = {10.1145/1057977.1057979},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ToloneAPH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/LeeGA05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Establishing trustworthiness in services of the critical infrastructure
                  through certification and accreditation},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {30},
  number       = {4},
  pages        = {1--7},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082983.1083205},
  doi          = {10.1145/1082983.1083205},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/LeeGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/SohrAM05,
  author       = {Karsten Sohr and
                  Gail{-}Joon Ahn and
                  Lars Migge},
  title        = {Articulating and enforcing authorisation policies with {UML} and {OCL}},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {30},
  number       = {4},
  pages        = {1--7},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082983.1083215},
  doi          = {10.1145/1082983.1083215},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/SohrAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YavagalLAG05,
  author       = {Deepak S. Yavagal and
                  Seok Won Lee and
                  Gail{-}Joon Ahn and
                  Robin A. Gandhi},
  editor       = {M{\'{a}}rio Guimar{\~{a}}es},
  title        = {Common criteria requirements modeling and its uses for quality of
                  information assurance (QoIA)},
  booktitle    = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
                  Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages        = {130--135},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1167253.1167287},
  doi          = {10.1145/1167253.1167287},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/YavagalLAG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/TeoA05,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  editor       = {M{\'{a}}rio Guimar{\~{a}}es},
  title        = {Supporting access control policies across multiple operating systems},
  booktitle    = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
                  Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages        = {288--293},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1167253.1167317},
  doi          = {10.1145/1167253.1167317},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/TeoA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AhnL05,
  author       = {Gail{-}Joon Ahn and
                  John Lam},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Atsuhiro Goto},
  title        = {Managing privacy preferences for federated identity management},
  booktitle    = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 11, 2005},
  pages        = {28--36},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102486.1102492},
  doi          = {10.1145/1102486.1102492},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/AhnL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SohrAGM05,
  author       = {Karsten Sohr and
                  Gail{-}Joon Ahn and
                  Martin Gogolla and
                  Lars Migge},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Specification and Validation of Authorisation Constraints Using {UML}
                  and {OCL}},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_5},
  doi          = {10.1007/11555827\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SohrAGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGA05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Establishing trustworthiness in services of the critical infrastructure
                  through certification and accreditation},
  booktitle    = {Proceedings of the 2005 Workshop on Software Engineering for Secure
                  Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
                  Missouri, USA, May 15-16, 2005},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1083200.1083205},
  doi          = {10.1145/1083200.1083205},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LeeGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SohrAM05,
  author       = {Karsten Sohr and
                  Gail{-}Joon Ahn and
                  Lars Migge},
  title        = {Articulating and enforcing authorisation policies with {UML} and {OCL}},
  booktitle    = {Proceedings of the 2005 Workshop on Software Engineering for Secure
                  Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
                  Missouri, USA, May 15-16, 2005},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1083200.1083215},
  doi          = {10.1145/1083200.1083215},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SohrAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeGAY05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn and
                  Deepak S. Yavagal},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {Active Automation of the {DITSCAP}},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {479--485},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_46},
  doi          = {10.1007/11427995\_46},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeeGAY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SohrDA05,
  author       = {Karsten Sohr and
                  Michael Drouineaud and
                  Gail{-}Joon Ahn},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {Formal specification of role-based security policies for clinical
                  information systems},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {332--339},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066756},
  doi          = {10.1145/1066677.1066756},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SohrDA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/FosterSA05,
  author       = {Joshua Foster and
                  Kalpathi R. Subramanian and
                  Gail{-}Joon Ahn},
  editor       = {Robert F. Erbacher and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Interactive exploration of large filesystems},
  booktitle    = {Visualization and Data Analysis 2005, San Jose, CA, USA, January 17,
                  2005},
  series       = {{SPIE} Proceedings},
  volume       = {5669},
  pages        = {307--315},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.589656},
  doi          = {10.1117/12.589656},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/FosterSA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2005,
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979},
  doi          = {10.1145/1063979},
  isbn         = {1-59593-045-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ShinACJ04,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Sangrae Cho and
                  Seunghun Jin},
  title        = {A role-based infrastructure management system: design and implementation},
  journal      = {Concurr. Pract. Exp.},
  volume       = {16},
  number       = {11},
  pages        = {1121--1141},
  year         = {2004},
  url          = {https://doi.org/10.1002/cpe.807},
  doi          = {10.1002/CPE.807},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ShinACJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/ShinA04,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn},
  editor       = {David A. Bader and
                  Ashfaq A. Khokhar},
  title        = {Role-based Trust Assignment in Trust Management Systems},
  booktitle    = {Proceedings of the {ISCA} 17th International Conference on Parallel
                  and Distributed Computing Systems, September 15-17, 2004, The Canterbury
                  Hotel, San Francisco, California, {USA}},
  pages        = {551--558},
  publisher    = {{ISCA}},
  year         = {2004},
  timestamp    = {Mon, 09 Aug 2021 16:35:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/ShinA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infovis/FosterSHA04,
  author       = {Joshua Foster and
                  Kalpathi R. Subramanian and
                  Robert Herring and
                  Gail{-}Joon Ahn},
  editor       = {Matthew O. Ward and
                  Tamara Munzner},
  title        = {Interactive Exploration of the {AFS} File System},
  booktitle    = {10th {IEEE} Symposium on Information Visualization (InfoVis 2004),
                  10-12 October 2004, Austin, TX, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/INFVIS.2004.40},
  doi          = {10.1109/INFVIS.2004.40},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/infovis/FosterSHA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/ShinAS04,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Prasad Shenoy},
  title        = {Ensuring information assurance in federated identity management},
  booktitle    = {Proceedings of the 23rd {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix,
                  Arizona, {USA}},
  pages        = {821--826},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/PCCC.2004.1395193},
  doi          = {10.1109/PCCC.2004.1395193},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/ShinAS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/AhnM04,
  author       = {Gail{-}Joon Ahn and
                  Badrinath Mohan},
  title        = {Secure Information Sharing Using Role-based Delegation},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {810--819},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286758},
  doi          = {10.1109/ITCC.2004.1286758},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/AhnM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TeoSA04,
  author       = {Lawrence Teo and
                  Yu{-}An Sun and
                  Gail{-}Joon Ahn},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Defeating Internet Attacks Using Risk Awareness and Active Honeypots},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {155--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288045},
  doi          = {10.1109/IWIA.2004.1288045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TeoSA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/AhnandH04,
  author       = {Gail{-}Joon Ahn and
                  Seng{-}Phil Hong},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  L. Javier Garc{\'{\i}}a{-}Villalba},
  title        = {Group Hierarchies with Constrained User Assignment in Linux},
  booktitle    = {Security In Information Systems, Proceedings of the 2nd International
                  Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
                  with {ICEIS} 2004, Porto, Portugal, April 2004},
  pages        = {13--22},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Mon, 13 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/AhnandH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AhnSZ04,
  author       = {Gail{-}Joon Ahn and
                  Dongwan Shin and
                  Longhua Zhang},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Role-Based Privilege Management Using Attribute Certificates and Delegation},
  booktitle    = {Trust and Privacy in Digital Business, First International Conference,
                  TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3184},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30079-3\_11},
  doi          = {10.1007/978-3-540-30079-3\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AhnSZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/AhnSH04,
  author       = {Gail{-}Joon Ahn and
                  Dongwan Shin and
                  Seng{-}Phil Hong},
  editor       = {Xiaofang Zhou and
                  Stanley Y. W. Su and
                  Mike P. Papazoglou and
                  Maria E. Orlowska and
                  Keith G. Jeffery},
  title        = {Information Assurance in Federated Identity Management: Experimentations
                  and Issues},
  booktitle    = {Web Information Systems - {WISE} 2004, 5th International Conference
                  on Web Information Systems Engineering, Brisbane, Australia, November
                  22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3306},
  pages        = {78--89},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30480-7\_10},
  doi          = {10.1007/978-3-540-30480-7\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/AhnSH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangAC03,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn and
                  Bei{-}tseng Chu},
  title        = {A rule-based framework for role-based delegation and revocation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {404--441},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937530},
  doi          = {10.1145/937527.937530},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/TeoZA03,
  author       = {Lawrence Teo and
                  Yuliang Zheng and
                  Gail{-}Joon Ahn},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion
                  Detection},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {73--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192460},
  doi          = {10.1109/IWIAS.2003.1192460},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/TeoZA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AhnM03,
  author       = {Gail{-}Joon Ahn and
                  Badrinath Mohan},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Role-Based Authorization in Decentralized Health Care Environments},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {251--256},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952584},
  doi          = {10.1145/952532.952584},
  timestamp    = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/AhnM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShinACJ03,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Sangrae Cho and
                  Seunghun Jin},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {A Role Administration System in Role-based Authorization Infrastructures
                  - Design and Implementation},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {325--330},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952598},
  doi          = {10.1145/952532.952598},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ShinACJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FerraioloCAG03,
  author       = {David F. Ferraiolo and
                  Ramaswamy Chandramouli and
                  Gail{-}Joon Ahn and
                  Serban I. Gavrila},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {The role control center: features and case studies},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {12--20},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775415},
  doi          = {10.1145/775412.775415},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/FerraioloCAG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ShinACJ03,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Sangrae Cho and
                  Seunghun Jin},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {On modeling system-centric information for role engineering},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775434},
  doi          = {10.1145/775412.775434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ShinACJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TeoAZ03,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn and
                  Yuliang Zheng},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {Dynamic and risk-aware network access management},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {217--230},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775441},
  doi          = {10.1145/775412.775441},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/TeoAZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhangA03,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Constrained Role-based Delegation},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {289--300},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 10:12:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZhangA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ToloneGA03,
  author       = {William J. Tolone and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Locale-based access control: placing collaborative authorization decisions
                  in context},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {4120--4127},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1245632},
  doi          = {10.1109/ICSMC.2003.1245632},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/ToloneGA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/AhnZSC03,
  author       = {Gail{-}Joon Ahn and
                  Longhua Zhang and
                  Dongwan Shin and
                  Bill Chu},
  title        = {Authorization management for role-based collaboration},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {4128--4134},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1245633},
  doi          = {10.1109/ICSMC.2003.1245633},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/AhnZSC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Ahn03,
  author       = {Gail{-}Joon Ahn},
  title        = {Specification and Classification of Role-based Authorization Policies},
  booktitle    = {12th {IEEE} International Workshops on Enabling Technologies {(WETICE}
                  2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003,
                  Linz, Austria},
  pages        = {202--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ENABL.2003.1231408},
  doi          = {10.1109/ENABL.2003.1231408},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/Ahn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/AhnHS02,
  author       = {Gail{-}Joon Ahn and
                  Seng{-}Phil Hong and
                  Michael E. Shin},
  title        = {Reconstructing a formal security model},
  journal      = {Inf. Softw. Technol.},
  volume       = {44},
  number       = {11},
  pages        = {649--657},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0950-5849(02)00092-7},
  doi          = {10.1016/S0950-5849(02)00092-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/AhnHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ShinAP02,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Joon S. Park},
  title        = {An Application of Directory Service Markup Language {(DSML)} for Role-Based
                  Access Control {(RBAC)}},
  booktitle    = {26th International Computer Software and Applications Conference {(COMPSAC}
                  2002), Prolonging Software Life: Development and Redevelopment, 26-29
                  August 2002, Oxford, England, Proceedings},
  pages        = {934--939},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CMPSAC.2002.1045125},
  doi          = {10.1109/CMPSAC.2002.1045125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ShinAP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ShinAC02,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Sangrae Cho},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Using {X.509} Attribute Certificates for Role-Based {EAM}},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {49--60},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ShinAC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip5-12/ToloneCAWS02,
  author       = {William J. Tolone and
                  Bei{-}tseng Chu and
                  Gail{-}Joon Ahn and
                  Robert G. Wilhelm and
                  John E. Sims},
  editor       = {Kurt Kosanke and
                  Roland Jochem and
                  James G. Nell and
                  {\'{A}}ngel Ortiz Bas},
  title        = {Challenges to Multi-Enterprise Integration},
  booktitle    = {Enterprise Inter- and Intra-Organizational Integration: Building International
                  Consensus, {IFIP} {TC5/WG5.12} International Conference on Enterprise
                  Integration and Modeling Technique (ICEIMT'02), April 24-26, 2002,
                  Valencia, Spain},
  series       = {{IFIP} Conference Proceedings},
  volume       = {236},
  pages        = {205--216},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Thu, 28 Feb 2019 15:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip5-12/ToloneCAWS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangAC02,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn and
                  Bei{-}tseng Chu},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {A role-based delegation framework for healthcare information systems},
  booktitle    = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
                  2002},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/507711.507731},
  doi          = {10.1145/507711.507731},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangAC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/AhnS02,
  author       = {Gail{-}Joon Ahn and
                  Dongwan Shin},
  title        = {Towards Scalable Authentication in Health Services},
  booktitle    = {11th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2002), 10-12 June 2002, Pittsburgh,
                  PA, {USA}},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ENABL.2002.1029993},
  doi          = {10.1109/ENABL.2002.1029993},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/AhnS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnK01,
  author       = {Gail{-}Joon Ahn and
                  Kwangjo Kim},
  title        = {{CONUGA:} Constrained User-Group Assignment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {24},
  number       = {2},
  pages        = {87--100},
  year         = {2001},
  url          = {https://doi.org/10.1006/jnca.2000.0125},
  doi          = {10.1006/JNCA.2000.0125},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhnK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/AhnS01,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  title        = {Decentralized user group assignment in Windows {NT}},
  journal      = {J. Syst. Softw.},
  volume       = {56},
  number       = {1},
  pages        = {39--49},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0164-1212(00)00084-4},
  doi          = {10.1016/S0164-1212(00)00084-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/AhnS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkSA01,
  author       = {Joon S. Park and
                  Ravi S. Sandhu and
                  Gail{-}Joon Ahn},
  title        = {Role-based access control on the web},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {37--71},
  year         = {2001},
  url          = {https://doi.org/10.1145/383775.383777},
  doi          = {10.1145/383775.383777},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkSA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ParkAS01,
  author       = {Joon S. Park and
                  Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {Role-based Access Control on the Web Using {LDAP}},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {19--30},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 13:50:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ParkAS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangAC01,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn and
                  Bei{-}tseng Chu},
  editor       = {Ravi S. Sandhu and
                  Trent Jaeger},
  title        = {A rule-based framework for role based delegation},
  booktitle    = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001},
  pages        = {153--162},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/373256.373289},
  doi          = {10.1145/373256.373289},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangAC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/AhnS01,
  author       = {Gail{-}Joon Ahn and
                  Michael E. Shin},
  title        = {Role-Based Authorization Constraints Specification Using Object Constraint
                  Language},
  booktitle    = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge,
                  MA, {USA}},
  pages        = {157--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ENABL.2001.953406},
  doi          = {10.1109/ENABL.2001.953406},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/AhnS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/Ahn00,
  author       = {Gail{-}Joon Ahn},
  title        = {Role-based access control in {DCOM}},
  journal      = {J. Syst. Archit.},
  volume       = {46},
  number       = {13},
  pages        = {1175--1184},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1383-7621(00)00017-5},
  doi          = {10.1016/S1383-7621(00)00017-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/Ahn00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhnS00,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  title        = {Role-based authorization constraints specification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {207--226},
  year         = {2000},
  url          = {https://doi.org/10.1145/382912.382913},
  doi          = {10.1145/382912.382913},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhnS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/AhnSKP00,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu and
                  Myong H. Kang and
                  Joon S. Park},
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Injecting {RBAC} to secure a Web-based workflow system},
  booktitle    = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287.344295},
  doi          = {10.1145/344287.344295},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rbac/AhnSKP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/ShinA00,
  author       = {Michael E. Shin and
                  Gail{-}Joon Ahn},
  title        = {UML-Based Representation of Role-Based Access Control},
  booktitle    = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
                  MD, {USA}},
  pages        = {195--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ENABL.2000.883728},
  doi          = {10.1109/ENABL.2000.883728},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/ShinA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnS99,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  title        = {Towards role-based administration in network information services},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {22},
  number       = {3},
  pages        = {199--213},
  year         = {1999},
  url          = {https://doi.org/10.1006/jnca.1999.0091},
  doi          = {10.1006/JNCA.1999.0091},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhnS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/AhnS99,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  editor       = {Charles E. Youman and
                  Sylvia L. Osborn},
  title        = {The {RSL99} Language for Role-Based Separation of Duty Constraints},
  booktitle    = {Proceedings of the Fourth {ACM} Workshop on Role-Based Access Control,
                  {RBAC} 1999, Fairfax, VA, USA, October 28-29, 1999},
  pages        = {43--54},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319171.319176},
  doi          = {10.1145/319171.319176},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/AhnS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics