Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gail-Joon Ahn
@article{DBLP:journals/isf/RubioMedranoSHCBSA23, author = {Carlos E. Rubio{-}Medrano and Pradeep Kumar Duraisamy Soundrapandian and Matthew Hill and Luis Claramunt and Jaejong Baek and Geetha S and Gail{-}Joon Ahn}, title = {DyPolDroid: Protecting Against Permission-Abuse Attacks in Android}, journal = {Inf. Syst. Frontiers}, volume = {25}, number = {2}, pages = {529--548}, year = {2023}, url = {https://doi.org/10.1007/s10796-022-10328-8}, doi = {10.1007/S10796-022-10328-8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/RubioMedranoSHCBSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BaekSKWSDA23, author = {Jaejong Baek and Pradeep Kumar Duraisamy Soundrapandian and Sukwha Kyung and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Targeted Privacy Attacks by Fingerprinting Mobile Apps in {LTE} Radio Layer}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {261--273}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00035}, doi = {10.1109/DSN58367.2023.00035}, timestamp = {Tue, 15 Aug 2023 11:43:57 +0200}, biburl = {https://dblp.org/rec/conf/dsn/BaekSKWSDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ClaramuntRBA23, author = {Luis Claramunt and Carlos E. Rubio{-}Medrano and Jaejong Baek and Gail{-}Joon Ahn}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593839}, doi = {10.1145/3589608.3593839}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ClaramuntRBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04896, author = {Erin Lanus and Charles J. Colbourn and Gail{-}Joon Ahn}, title = {Guaranteeing Anonymity in Attribute-Based Authorization}, journal = {CoRR}, volume = {abs/2310.04896}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04896}, doi = {10.48550/ARXIV.2310.04896}, eprinttype = {arXiv}, eprint = {2310.04896}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04896.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZhangOCSJWSKBWS22, author = {Penghui Zhang and Adam Oest and Haehyun Cho and Zhibo Sun and RC Johnson and Brad Wardman and Shaown Sarker and Alexandros Kapravelos and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {10--21}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3129992}, doi = {10.1109/MSEC.2021.3129992}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ZhangOCSJWSKBWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/ChoPOB0SDA22, author = {Haehyun Cho and Jinbum Park and Adam Oest and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Babak Falsafi and Michael Ferdman and Shan Lu and Thomas F. Wenisch}, title = {ViK: practical mitigation of temporal memory safety violations through object {ID} inspection}, booktitle = {{ASPLOS} '22: 27th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022 - 4 March 2022}, pages = {271--284}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3503222.3507780}, doi = {10.1145/3503222.3507780}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/ChoPOB0SDA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangSKBBCO0BSA22, author = {Penghui Zhang and Zhibo Sun and Sukwha Kyung and Hans Walter Behrens and Zion Leonahenahe Basque and Haehyun Cho and Adam Oest and Ruoyu Wang and Tiffany Bao and Yan Shoshitaishvili and Gail{-}Joon Ahn and Adam Doup{\'{e}}}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {I'm SPARTACUS, No, I'm {SPARTACUS:} Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3165--3179}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559334}, doi = {10.1145/3548606.3559334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangSKBBCO0BSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VishwamitraLHC022, author = {Nishant Vishwamitra and Yifang Li and Hongxin Hu and Kelly Caine and Long Cheng and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {65--76}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511517}, doi = {10.1145/3508398.3511517}, timestamp = {Wed, 20 Apr 2022 12:17:48 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/VishwamitraLHC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenWHZCDA21, author = {Jing Chen and Chiheng Wang and Kun He and Ziming Zhao and Min Chen and Ruiying Du and Gail{-}Joon Ahn}, title = {Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {15--29}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2871682}, doi = {10.1109/TDSC.2018.2871682}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenWHZCDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/KimCKDSAD21, author = {Doowon Kim and Haehyun Cho and Yonghwi Kwon and Adam Doup{\'{e}} and Sooel Son and Gail{-}Joon Ahn and Tudor Dumitras}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Security Analysis on Practices of Certificate Authorities in the {HTTPS} Phishing Ecosystem}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {407--420}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453100}, doi = {10.1145/3433210.3453100}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/KimCKDSAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/HillRCBA21, author = {Matthew Hill and Carlos E. Rubio{-}Medrano and Luis Claramunt and Jaejong Baek and Gail{-}Joon Ahn}, title = {Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {704--706}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00053}, doi = {10.1109/EUROSP51992.2021.00053}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/HillRCBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ClaramuntERBA21, author = {Luis Claramunt and Larissa Pokam Epse and Carlos E. Rubio{-}Medrano and Jaejong Baek and Gail{-}Joon Ahn}, title = {Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {713--715}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00056}, doi = {10.1109/EUROSP51992.2021.00056}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ClaramuntERBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SoundrapandianB21, author = {Pradeep Kumar Duraisamy Soundrapandian and Tiffany Bao and Jaejong Baek and Yan Shoshitaishvili and Adam Doup{\'{e}} and Ruoyu Wang and Gail{-}Joon Ahn}, title = {MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--10}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/71490}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SoundrapandianB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DinhCMOZKAB0DS21, author = {Sung Ta Dinh and Haehyun Cho and Kyle Martin and Adam Oest and Kyle Zeng and Alexandros Kapravelos and Gail{-}Joon Ahn and Tiffany Bao and Ruoyu Wang and Adam Doup{\'{e}} and Yan Shoshitaishvili}, title = {Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/favocado-fuzzing-the-binding-code-of-javascript-engines-using-semantically-correct-test-cases/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DinhCMOZKAB0DS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/Rubio-MedranoHC21, author = {Carlos E. Rubio{-}Medrano and Matthew Hill and Luis M. Claramunt and Jaejong Baek and Gail{-}Joon Ahn}, editor = {Ram Krishnan and H. Raghav Rao and Sanjay K. Sahay and Sagar Samtani and Ziming Zhao}, title = {DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android}, booktitle = {Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, {SKM} 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1549}, pages = {23--36}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_2}, doi = {10.1007/978-3-030-97532-6\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/skm/Rubio-MedranoHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangOCSJWSKBWS21, author = {Penghui Zhang and Adam Oest and Haehyun Cho and Zhibo Sun and RC Johnson and Brad Wardman and Shaown Sarker and Alexandros Kapravelos and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1109--1124}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00021}, doi = {10.1109/SP40001.2021.00021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangOCSJWSKBWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunOZRB00SDA21, author = {Zhibo Sun and Adam Oest and Penghui Zhang and Carlos E. Rubio{-}Medrano and Tiffany Bao and Ruoyu Wang and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4169--4186}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhibo}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/SunOZRB00SDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-12843, author = {Marzieh Bitaab and Haehyun Cho and Adam Oest and Penghui Zhang and Zhibo Sun and Rana Pourmohamad and Doowon Kim and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing}, journal = {CoRR}, volume = {abs/2103.12843}, year = {2021}, url = {https://arxiv.org/abs/2103.12843}, eprinttype = {arXiv}, eprint = {2103.12843}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-12843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lopez-MoralesRD20, author = {Efr{\'{e}}n L{\'{o}}pez{-}Morales and Carlos E. Rubio{-}Medrano and Adam Doup{\'{e}} and Yan Shoshitaishvili and Ruoyu Wang and Tiffany Bao and Gail{-}Joon Ahn}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {HoneyPLC: {A} Next-Generation Honeypot for Industrial Control Systems}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {279--291}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423356}, doi = {10.1145/3372297.3423356}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Lopez-MoralesRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BitaabCOZSPKBWS20, author = {Marzieh Bitaab and Haehyun Cho and Adam Oest and Penghui Zhang and Zhibo Sun and Rana Pourmohamad and Doowon Kim and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493260}, doi = {10.1109/ECRIME51433.2020.9493260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BitaabCOZSPKBWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ChoPK0SDA20, author = {Haehyun Cho and Jinbum Park and Donguk Kim and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Eyal de Lara and Iqbal Mohomed and Jason Nieh and Elizabeth M. Belding}, title = {SmokeBomb: effective mitigation against cache side-channel attacks on the {ARM} architecture}, booktitle = {MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services, Toronto, Ontario, Canada, June 15-19, 2020}, pages = {107--120}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386901.3388888}, doi = {10.1145/3386901.3388888}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ChoPK0SDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoCJ20, author = {Carlos E. Rubio{-}Medrano and Luis Claramunt and Shaishavkumar Jogani and Gail{-}Joon Ahn}, editor = {Jorge Lobo and Scott D. Stoller and Peng Liu}, title = {Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to {ABAC} Policies}, booktitle = {Proceedings of the 25th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020}, pages = {131--144}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3381991.3395615}, doi = {10.1145/3381991.3395615}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoCJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/Rubio-Medrano0A20, author = {Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, title = {Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {319--322}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00048}, doi = {10.1109/TPS-ISA50397.2020.00048}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/Rubio-Medrano0A20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OestZWNBZTDA20, author = {Adam Oest and Penghui Zhang and Brad Wardman and Eric Nunes and Jakub Burgis and Ali Zand and Kurt Thomas and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {361--377}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-sunrise}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/OestZWNBZTDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ChoPKB0SDA20, author = {Haehyun Cho and Jinbum Park and Joonwon Kang and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Yuval Yarom and Sarah Zennou}, title = {Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers}, booktitle = {14th {USENIX} Workshop on Offensive Technologies, {WOOT} 2020, August 11, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/woot20/presentation/cho}, timestamp = {Mon, 01 Feb 2021 08:41:50 +0100}, biburl = {https://dblp.org/rec/conf/woot/ChoPKB0SDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2020autosec, editor = {Qi Alfred Chen and Ziming Zhao and Gail{-}Joon Ahn}, title = {AutoSec@CODASPY '20: Proceedings of the Second {ACM} Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375706}, doi = {10.1145/3375706}, isbn = {978-1-4503-7113-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2020autosec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuHKWAZL19, author = {Hongxin Hu and Wonkyu Han and Sukwha Kyung and Juan Wang and Gail{-}Joon Ahn and Ziming Zhao and Hongda Li}, title = {Towards a reliable firewall for software-defined networks}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101597}, doi = {10.1016/J.COSE.2019.101597}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuHKWAZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AhnGHS19, author = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {6}, pages = {913--914}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2019.2906921}, doi = {10.1109/TDSC.2019.2906921}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhnGHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KokuluSBS0DA19, author = {Faris Bugra Kokulu and Ananta Soneji and Tiffany Bao and Yan Shoshitaishvili and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Matched and Mismatched SOCs: {A} Qualitative Study on Security Operations Center Issues}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1955--1970}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354239}, doi = {10.1145/3319535.3354239}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KokuluSBS0DA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChowdharyHAKKV19, author = {Ankur Chowdhary and Dijiang Huang and Gail{-}Joon Ahn and Myong H. Kang and Anya Kim and Alexander Velazquez}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {{SDNSOC:} Object Oriented {SDN} Framework}, booktitle = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, Richardson, TX, USA, March 27, 2019}, pages = {7--12}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309194.3309196}, doi = {10.1145/3309194.3309196}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChowdharyHAKKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SunR0BDA19, author = {Zhibo Sun and Carlos E. Rubio{-}Medrano and Ziming Zhao and Tiffany Bao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Understanding and Predicting Private Interactions in Underground Forums}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {303--314}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300036}, doi = {10.1145/3292006.3300036}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SunR0BDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/LampR0A19, author = {Josephine Lamp and Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, title = {ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems}, booktitle = {7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES@CPSIoTWeek 2019, Montreal, QC, Canada, April 15, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MSCPES.2019.8738791}, doi = {10.1109/MSCPES.2019.8738791}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpsweek/LampR0A19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZhangC0DA19, author = {Penghui Zhang and Haehyun Cho and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {iCore: continuous and proactive extrospection on multi-core IoT devices}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {851--860}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297364}, doi = {10.1145/3297280.3297364}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ZhangC0DA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoJL19, author = {Carlos E. Rubio{-}Medrano and Shaishavkumar Jogani and Maria Leitner and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {195--206}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325109}, doi = {10.1145/3322431.3325109}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OestSDAWT19, author = {Adam Oest and Yeganeh Safaei and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Brad Wardman and Kevin Tyers}, title = {PhishFarm: {A} Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1344--1361}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00049}, doi = {10.1109/SP.2019.00049}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/OestSDAWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TuD0A19, author = {Huahong Tu and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Nadia Heninger and Patrick Traynor}, title = {Users Really Do Answer Telephone Scams}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1327--1340}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/tu}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/TuD0A19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2019, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006}, doi = {10.1145/3292006}, isbn = {978-1-4503-6099-9}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2019autosec, editor = {Ziming Zhao and Qi Alfred Chen and Gail{-}Joon Ahn}, title = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309171}, doi = {10.1145/3309171}, isbn = {978-1-4503-6180-4}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2019autosec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2019sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, Richardson, TX, USA, March 27, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309194}, doi = {10.1145/3309194}, isbn = {978-1-4503-6179-8}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2019sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoYA18, author = {Haehyun Cho and Jeong Hyun Yi and Gail{-}Joon Ahn}, title = {DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications}, journal = {{IEEE} Access}, volume = {6}, pages = {71229--71240}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2881699}, doi = {10.1109/ACCESS.2018.2881699}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChoYA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimCAY18, author = {Hyunki Kim and Taejoo Cho and Gail{-}Joon Ahn and Jeong Hyun Yi}, title = {Risk assessment of mobile applications based on machine learned malware dataset}, journal = {Multim. Tools Appl.}, volume = {77}, number = {4}, pages = {5027--5042}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4756-0}, doi = {10.1007/S11042-017-4756-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimCAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoLXA18, author = {Xinxin Zhao and Lingjun Li and Guoliang Xue and Gail{-}Joon Ahn}, title = {Efficient Anonymous Message Submission}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {217--230}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2556659}, doi = {10.1109/TDSC.2016.2556659}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoLXA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenWZCDA18, author = {Jing Chen and Chiheng Wang and Ziming Zhao and Kai Chen and Ruiying Du and Gail{-}Joon Ahn}, title = {Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1286--1300}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787905}, doi = {10.1109/TIFS.2017.2787905}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenWZCDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaekKC0SDA18, author = {Jaejong Baek and Sukwha Kyung and Haehyun Cho and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {278--288}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274753}, doi = {10.1145/3274694.3274753}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BaekKC0SDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChoZKPL0DA18, author = {Haehyun Cho and Penghui Zhang and Donguk Kim and Jinbum Park and Choong{-}Hoon Lee and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Prime+Count: Novel Cross-world Covert Channels on {ARM} TrustZone}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {441--452}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274704}, doi = {10.1145/3274694.3274704}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChoZKPL0DA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiHGAZ18, author = {Hongda Li and Hongxin Hu and Guofei Gu and Gail{-}Joon Ahn and Fuqiang Zhang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {17--34}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243862}, doi = {10.1145/3243734.3243862}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiHGAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gutierrez0DSA18, author = {Mauricio Gutierrez and Ziming Zhao and Adam Doup{\'{e}} and Yan Shoshitaishvili and Gail{-}Joon Ahn}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {CacheLight: Defeating the CacheKit Attack}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {65--74}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266449}, doi = {10.1145/3266444.3266449}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gutierrez0DSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DixitDS0A18, author = {Vaibhav Hemant Dixit and Adam Doup{\'{e}} and Yan Shoshitaishvili and Ziming Zhao and Gail{-}Joon Ahn}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{AIM-SDN:} Attacking Information Mismanagement in SDN-datastores}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {664--676}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243799}, doi = {10.1145/3243734.3243799}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DixitDS0A18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chase/LampR0A18, author = {Josephine Lamp and Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Weisong Shi and Anwar Walid and E. Kevin Hall and Fei Wang and Gang Zhou}, title = {The Danger of Missing Instructions: {A} Systematic Analysis of Security Requirements for {MCPS}}, booktitle = {Proceedings of the Third {IEEE/ACM} International Conference on Connected Health: Applications, Systems and Engineering Technologies, {CHASE} 2018, Washington, DC, USA, September 26-28, 2018}, pages = {94--99}, publisher = {{ACM} / {IEEE}}, year = {2018}, url = {https://doi.org/10.1145/3278576.3278602}, doi = {10.1145/3278576.3278602}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chase/LampR0A18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/DixitKZDSA18, author = {Vaibhav Hemant Dixit and Sukwha Kyung and Ziming Zhao and Adam Doup{\'{e}} and Yan Shoshitaishvili and Gail{-}Joon Ahn}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Challenges and Preparedness of SDN-based Firewalls}, booktitle = {Proceedings of the 2018 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {33--38}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180465.3180468}, doi = {10.1145/3180465.3180468}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/DixitKZDSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhangNCZDA18, author = {Penghui Zhang and Bernard Ngabonziza and Haehyun Cho and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {SeCore: Continuous Extrospection with High Visibility on Multi-core {ARM} Platforms}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {161--163}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176948}, doi = {10.1145/3176258.3176948}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhangNCZDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/OestSDAWW18, author = {Adam Oest and Yeganeh Safaei and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Brad Wardman and Gary Warner}, title = {Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis}, booktitle = {2018 {APWG} Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018}, pages = {1--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ECRIME.2018.8376206}, doi = {10.1109/ECRIME.2018.8376206}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/OestSDAWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MabeyD0A18, author = {Mike Mabey and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Challenges, Opportunities and a Framework for Web Environment Forensics}, booktitle = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {532}, pages = {11--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99277-8\_2}, doi = {10.1007/978-3-319-99277-8\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/MabeyD0A18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ChandramouliBKV18, author = {Sai Prashanth Chandramouli and Pierre{-}Marie Bajan and Christopher Kruegel and Giovanni Vigna and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Measuring E-mail header injections on the world wide web}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1647--1656}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167308}, doi = {10.1145/3167132.3167308}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ChandramouliBKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/CoughlinR0A18, author = {Vu Coughlin and Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, title = {EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems}, booktitle = {2018 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg, Denmark, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartGridComm.2018.8587430}, doi = {10.1109/SMARTGRIDCOMM.2018.8587430}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/CoughlinR0A18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018asia, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494}, doi = {10.1145/3196494}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2018, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3176258}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2018sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the 2018 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3180465}, timestamp = {Sun, 18 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2018sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/Ahn18, author = {Gail{-}Joon Ahn}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Discretionary Access Control}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_135}, doi = {10.1007/978-1-4614-8265-9\_135}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/Ahn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/TuDZA17, author = {Huahong Tu and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {Toward Standardization of Authenticated Caller {ID} Transmission}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {1}, number = {3}, pages = {30--36}, year = {2017}, url = {https://doi.org/10.1109/MCOMSTD.2017.1700019}, doi = {10.1109/MCOMSTD.2017.1700019}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csm/TuDZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/ChandramouliZDA17, author = {Sai Prashanth Chandramouli and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {E-mail Header Injection Vulnerabilities}, journal = {it Inf. Technol.}, volume = {59}, number = {2}, pages = {67}, year = {2017}, url = {https://doi.org/10.1515/itit-2016-0039}, doi = {10.1515/ITIT-2016-0039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/ChandramouliZDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/SenguptaVKDZTA17, author = {Sailik Sengupta and Satya Gautam Vadlamudi and Subbarao Kambhampati and Adam Doup{\'{e}} and Ziming Zhao and Marthony Taguinod and Gail{-}Joon Ahn}, editor = {Kate Larson and Michael Winikoff and Sanmay Das and Edmund H. Durfee}, title = {A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications}, booktitle = {Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, {AAMAS} 2017, S{\~{a}}o Paulo, Brazil, May 8-12, 2017}, pages = {178--186}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3091155}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/SenguptaVKDZTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rubio-MedranoLD17, author = {Carlos E. Rubio{-}Medrano and Josephine Lamp and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Hamed Okhravi and Xinming Ou}, title = {Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control}, booktitle = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {39--49}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140549.3140553}, doi = {10.1145/3140549.3140553}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Rubio-MedranoLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KyungHTDSZDA17, author = {Sukwha Kyung and Wonkyu Han and Naveen Tiwari and Vaibhav Hemant Dixit and Lakshmi Srinivas and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {HoneyProxy: Design and implementation of next-generation honeynet via {SDN}}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228653}, doi = {10.1109/CNS.2017.8228653}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/KyungHTDSZDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/McLaughlinRKYMS17, author = {Niall McLaughlin and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and BooJoong Kang and Suleiman Y. Yerima and Paul Miller and Sakir Sezer and Yeganeh Safaei and Erik Trickel and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Deep Android Malware Detection}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {301--308}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029823}, doi = {10.1145/3029806.3029823}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/McLaughlinRKYMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/LampRZA17, author = {Josephine Lamp and Carlos E. Rubio{-}Medrano and Ziming Zhao and Gail{-}Joon Ahn}, title = {OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00012}, doi = {10.1109/CIC.2017.00012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/LampRZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DengLHWAZH17, author = {Juan Deng and Hongda Li and Hongxin Hu and Kuang{-}Ching Wang and Gail{-}Joon Ahn and Ziming Zhao and Wonkyu Han}, title = {On the Safety and Efficiency of Virtual Firewall Elasticity Control}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/safety-and-efficiency-virtual-firewall-elasticity-control/}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DengLHWAZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/ChowdharyDTKHA17, author = {Ankur Chowdhary and Vaibhav Hemant Dixit and Naveen Tiwari and Sukwha Kyung and Dijiang Huang and Gail{-}Joon Ahn}, title = {Science {DMZ:} {SDN} based secured cloud testbed}, booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017}, pages = {1--2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NFV-SDN.2017.8169868}, doi = {10.1109/NFV-SDN.2017.8169868}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/ChowdharyDTKHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LiDHWAZH17, author = {Hongda Li and Juan Deng and Hongxin Hu and Kuang{-}Ching Wang and Gail{-}Joon Ahn and Ziming Zhao and Wonkyu Han}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {129--131}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084166}, doi = {10.1145/3078861.3084166}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LiDHWAZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VishwamitraLWHC17, author = {Nishant Vishwamitra and Yifang Li and Kevin Wang and Hongxin Hu and Kelly Caine and Gail{-}Joon Ahn}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {155--166}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078875}, doi = {10.1145/3078861.3078875}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VishwamitraLWHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HongHLWNMYCA17, author = {Yunfeng Hong and Yongjian Hu and Chun{-}Ming Lai and Shyhtsun Felix Wu and Iulian Neamtiu and Patrick D. McDaniel and Paul L. Yu and Hasan Cam and Gail{-}Joon Ahn}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Defining and Detecting Environment Discrimination in Android Apps}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {510--529}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_26}, doi = {10.1007/978-3-319-78813-5\_26}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/HongHLWNMYCA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2017, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3029806}, isbn = {978-1-4503-4523-1}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2017sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3040992}, doi = {10.1145/3040992}, isbn = {978-1-4503-4908-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2017sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MabeyD0A16, author = {Mike Mabey and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {dbling: Identifying extensions installed on encrypted web thin clients}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S55--S65}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.007}, doi = {10.1016/J.DIIN.2016.04.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MabeyD0A16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZhaoSAHJH16, author = {Ziming Zhao and Mukund Sankaran and Gail{-}Joon Ahn and Thomas J. Holt and Yiming Jing and Hongxin Hu}, title = {Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {3}, pages = {32--43}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.46}, doi = {10.1109/MSP.2016.46}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ZhaoSAHJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JingAHCZ16, author = {Yiming Jing and Gail{-}Joon Ahn and Hongxin Hu and Haehyun Cho and Ziming Zhao}, title = {TripleMon: {A} multi-layer security framework for mediating inter-process communication on Android}, journal = {J. Comput. Secur.}, volume = {24}, number = {4}, pages = {405--426}, year = {2016}, url = {https://doi.org/10.3233/JCS-160552}, doi = {10.3233/JCS-160552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JingAHCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/VadlamudiSTZDAK16, author = {Satya Gautam Vadlamudi and Sailik Sengupta and Marthony Taguinod and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Subbarao Kambhampati}, editor = {Catholijn M. Jonker and Stacy Marsella and John Thangarajah and Karl Tuyls}, title = {Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract)}, booktitle = {Proceedings of the 2016 International Conference on Autonomous Agents {\&} Multiagent Systems, Singapore, May 9-13, 2016}, pages = {1377--1378}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2937168}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/VadlamudiSTZDAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JingADY16, author = {Yiming Jing and Gail{-}Joon Ahn and Adam Doup{\'{e}} and Jeong Hyun Yi}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Checking Intent-based Communication in Android with Intent Space Analysis}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {735--746}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897904}, doi = {10.1145/2897845.2897904}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JingADY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HanZDA16, author = {Wonkyu Han and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {HoneyMix: Toward SDN-based Intelligent Honeynet}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, pages = {1--6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2876019.2876022}, doi = {10.1145/2876019.2876022}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HanZDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Rubio-MedranoLT16, author = {Carlos E. Rubio{-}Medrano and Josephine Lamp and Marthony Taguinod and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {68--71}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875499}, doi = {10.1145/2875491.2875499}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Rubio-MedranoLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/ModiSPKZDAB16, author = {Ajay Modi and Zhibo Sun and Anupam Panwar and Tejas Khairnar and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Paul Black}, title = {Towards Automated Threat Intelligence Fusion}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {408--416}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.060}, doi = {10.1109/CIC.2016.060}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/ModiSPKZDAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LiaoZDA16, author = {Kevin Liao and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin}, booktitle = {2016 {APWG} Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016}, pages = {1--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ECRIME.2016.7487938}, doi = {10.1109/ECRIME.2016.7487938}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/LiaoZDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/JangAHK16, author = {Dae{-}il Jang and Gail{-}Joon Ahn and Hyunuk Hwang and Kibom Kim}, title = {Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper)}, booktitle = {17th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016}, pages = {609--614}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IRI.2016.94}, doi = {10.1109/IRI.2016.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/JangAHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kaleidoscope/TuDZA16, author = {Huahong Tu and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {Toward authenticated caller {ID} transmission: The need for a standardized authentication scheme in {Q.731.3} calling line identification presentation}, booktitle = {2016 {ITU} Kaleidoscope: ICTs for a Sustainable World, Bangkok, Thailand, November 14-16, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ITU-WT.2016.7805728}, doi = {10.1109/ITU-WT.2016.7805728}, timestamp = {Wed, 11 Aug 2021 11:51:26 +0200}, biburl = {https://dblp.org/rec/conf/kaleidoscope/TuDZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HanHZDAWD16, author = {Wonkyu Han and Hongxin Hu and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn and Kuang{-}Ching Wang and Juan Deng}, editor = {X. Sean Wang and Lujo Bauer and Florian Kerschbaum}, title = {State-aware Network Access Management for Software-Defined Networks}, booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016}, pages = {1--11}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2914642.2914643}, doi = {10.1145/2914642.2914643}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HanHZDAWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TuDZA16, author = {Huahong Tu and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {SoK: Everyone Hates Robocalls: {A} Survey of Techniques Against Telephone Spam}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {320--338}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.27}, doi = {10.1109/SP.2016.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TuDZA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2016sdn-nfv, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2876019}, isbn = {978-1-4503-4078-6}, timestamp = {Tue, 15 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2016sdn-nfv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VadlamudiSKTZDA16, author = {Satya Gautam Vadlamudi and Sailik Sengupta and Subbarao Kambhampati and Marthony Taguinod and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Moving Target Defense for Web Applications using Bayesian Stackelberg Games}, journal = {CoRR}, volume = {abs/1602.07024}, year = {2016}, url = {http://arxiv.org/abs/1602.07024}, eprinttype = {arXiv}, eprint = {1602.07024}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VadlamudiSKTZDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YiRA15, author = {Jeong Hyun Yi and Kyung Hyune Rhee and Gail{-}Joon Ahn}, title = {Preface - {WISA} 2014}, journal = {Comput. Secur.}, volume = {52}, pages = {250}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.05.008}, doi = {10.1016/J.COSE.2015.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YiRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eetcc/Rubio-MedranoAS15, author = {Carlos E. Rubio{-}Medrano and Gail{-}Joon Ahn and Karsten Sohr}, title = {Achieving Security Assurance with Assertion-based Application Construction}, journal = {{EAI} Endorsed Trans. Collab. Comput.}, volume = {1}, number = {6}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/eai.21-12-2015.150819}, doi = {10.4108/EAI.21-12-2015.150819}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eetcc/Rubio-MedranoAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JingAZH15, author = {Yiming Jing and Gail{-}Joon Ahn and Ziming Zhao and Hongxin Hu}, title = {Towards Automated Risk Assessment and Mitigation of Mobile Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {571--584}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366457}, doi = {10.1109/TDSC.2014.2366457}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JingAZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoAH15, author = {Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, title = {Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {4}, pages = {14:1--14:37}, year = {2015}, url = {https://doi.org/10.1145/2701423}, doi = {10.1145/2701423}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaassAG15, author = {Jon C. Haass and Gail{-}Joon Ahn and Frank Grimmelmann}, editor = {Indrajit Ray and Tomas Sander and Moti Yung}, title = {{ACTRA:} {A} Case Study for Threat Information Sharing}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {23--26}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808128.2808135}, doi = {10.1145/2808128.2808135}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaassAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/Riad0HA15, author = {Khaled Riad and Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn}, title = {{AR-ABAC:} {A} New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing}, booktitle = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015, Hangzhou, China, October 27-30, 2015}, pages = {28--35}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIC.2015.38}, doi = {10.1109/CIC.2015.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/Riad0HA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PaxtonJRAMH15, author = {Napoleon Paxton and Dae{-}il Jang and Stephen Russell and Gail{-}Joon Ahn and Ira S. Moskowitz and Paul Hyden}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {5244--5252}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.619}, doi = {10.1109/HICSS.2015.619}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PaxtonJRAMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/TaguinodDZA15, author = {Marthony Taguinod and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {Toward a Moving Target Defense for Web Applications}, booktitle = {2015 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015}, pages = {510--517}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IRI.2015.84}, doi = {10.1109/IRI.2015.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/TaguinodDZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/DengHLPWABP15, author = {Juan Deng and Hongxin Hu and Hongda Li and Zhizhong Pan and Kuang{-}Ching Wang and Gail{-}Joon Ahn and Jun Bi and Younghee Park}, title = {VNGuard: An {NFV/SDN} combination framework for provisioning and managing virtual firewalls}, booktitle = {{IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2015, San Francisco, CA, USA, November 18-21, 2015}, pages = {107--114}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NFV-SDN.2015.7387414}, doi = {10.1109/NFV-SDN.2015.7387414}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/DengHLPWABP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Rubio-MedranoZD15, author = {Carlos E. Rubio{-}Medrano and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Federated Access Management for Collaborative Network Environments: Framework and Case Study}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {125--134}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752977}, doi = {10.1145/2752952.2752977}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Rubio-MedranoZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015asia, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2714576}, isbn = {978-1-4503-3245-3}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2015asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/0001MHAH14, author = {Yan Zhu and Di Ma and Changjun Hu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Secure and efficient random functions with variable-length output}, journal = {J. Netw. Comput. Appl.}, volume = {45}, pages = {121--133}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.07.033}, doi = {10.1016/J.JNCA.2014.07.033}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/0001MHAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JingZAH14, author = {Yiming Jing and Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Morpheus: automatically generating heuristics to detect Android emulators}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {216--225}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664250}, doi = {10.1145/2664243.2664250}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JingZAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhnD14, author = {Gail{-}Joon Ahn and Anupam Datta}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{WPES} 2014: 13th Workshop on Privacy in the Electronic Society}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1546--1547}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660383}, doi = {10.1145/2660267.2660383}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhnD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JingAZH14, author = {Yiming Jing and Gail{-}Joon Ahn and Ziming Zhao and Hongxin Hu}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {RiskMon: continuous and automated risk assessment of mobile applications}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {99--110}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557549}, doi = {10.1145/2557547.2557549}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JingAZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/PaxtonJMAR14, author = {Napoleon Paxton and Dae{-}il Jang and Ira S. Moskowitz and Gail{-}Joon Ahn and Stephen Russell}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {Discovering and analyzing deviant communities: Methods and experiments}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {163--170}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257262}, doi = {10.4108/ICST.COLLABORATECOM.2014.257262}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/PaxtonJMAR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/Rubio-MedranoAS14, author = {Carlos E. Rubio{-}Medrano and Gail{-}Joon Ahn and Karsten Sohr}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {Achieving security assurance with assertion-based application construction}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {503--510}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257691}, doi = {10.4108/ICST.COLLABORATECOM.2014.257691}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/Rubio-MedranoAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HanHA14, author = {Wonkyu Han and Hongxin Hu and Gail{-}Joon Ahn}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{LPM:} Layered Policy Management for Software-Defined Networks}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {356--363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_23}, doi = {10.1007/978-3-662-43936-4\_23}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HanHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/DSouzaAT14, author = {Clinton D'Souza and Gail{-}Joon Ahn and Marthony Taguinod}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {Policy-driven security management for fog computing: Preliminary framework and a case study}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051866}, doi = {10.1109/IRI.2014.7051866}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/DSouzaAT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ons/HuAHZ14, author = {Hongxin Hu and Gail{-}Joon Ahn and Wonkyu Han and Ziming Zhao}, editor = {Rob Sherwood}, title = {Towards a Reliable {SDN} Firewall}, booktitle = {Open Networking Summit 2014 - Research Track, {ONS} 2014, Santa Clara, CA, USA, March 2-4, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/ons2014/technical-sessions/presentation/hu}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ons/HuAHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HuAZY14, author = {Hongxin Hu and Gail{-}Joon Ahn and Ziming Zhao and Dejun Yang}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Game theoretic analysis of multiparty access control in online social networks}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {93--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613097}, doi = {10.1145/2613087.2613097}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HuAZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/HuHAZ14, author = {Hongxin Hu and Wonkyu Han and Gail{-}Joon Ahn and Ziming Zhao}, editor = {Aditya Akella and Albert G. Greenberg}, title = {{FLOWGUARD:} building robust firewalls for software-defined networks}, booktitle = {Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014}, pages = {97--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2620728.2620749}, doi = {10.1145/2620728.2620749}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/HuHAZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2660267}, isbn = {978-1-4503-2957-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014aisec, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2666652}, isbn = {978-1-4503-3153-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014ccsw, editor = {Gail{-}Joon Ahn and Alina Oprea and Reihaneh Safavi{-}Naini}, title = {Proceedings of the 6th edition of the {ACM} Workshop on Cloud Computing Security, {CCSW} '14, Scottsdale, Arizona, USA, November 7, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664168}, doi = {10.1145/2664168}, isbn = {978-1-4503-3239-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014trusted, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141}, doi = {10.1145/2666141}, isbn = {978-1-4503-3149-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014wiscs, editor = {Gail{-}Joon Ahn and Tomas Sander}, title = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&} Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663876}, doi = {10.1145/2663876}, isbn = {978-1-4503-3151-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014wiscs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2014, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2665943}, isbn = {978-1-4503-3148-7}, timestamp = {Fri, 20 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SinghalCGSKAB13, author = {Mukesh Singhal and Santosh Chandrasekhar and Tingjian Ge and Ravi S. Sandhu and Ram Krishnan and Gail{-}Joon Ahn and Elisa Bertino}, title = {Collaboration in Multicloud Computing Environments: Framework and Security Issues}, journal = {Computer}, volume = {46}, number = {2}, pages = {76--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.46}, doi = {10.1109/MC.2013.46}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TeoA13, author = {Lawrence Teo and Gail{-}Joon Ahn}, title = {Extensible policy framework for heterogeneous network environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {251--274}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058210}, doi = {10.1504/IJICS.2013.058210}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TeoA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/XuSA13, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, title = {Visualization-based policy analysis for SELinux: framework and user study}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {155--171}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0180-7}, doi = {10.1007/S10207-012-0180-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/XuSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK13, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Discovery and Resolution of Anomalies in Web Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {341--354}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.18}, doi = {10.1109/TDSC.2013.18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuAHMW13, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Di Ma and Shan{-}Biao Wang}, title = {Role-Based Cryptosystem: {A} New Cryptographic {RBAC} System Based on Role-Key Hierarchy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {12}, pages = {2138--2153}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2287858}, doi = {10.1109/TIFS.2013.2287858}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuAHMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/HuAJ13, author = {Hongxin Hu and Gail{-}Joon Ahn and Jan Jorgensen}, title = {Multiparty Access Control for Online Social Networks: Model and Mechanisms}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {7}, pages = {1614--1627}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2012.97}, doi = {10.1109/TKDE.2012.97}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/HuAJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhuAHYAH13, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau and Ho G. An and Changjun Hu}, title = {Dynamic Audit Services for Outsourced Storages in Clouds}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {6}, number = {2}, pages = {227--238}, year = {2013}, url = {https://doi.org/10.1109/TSC.2011.51}, doi = {10.1109/TSC.2011.51}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ZhuAHYAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhaoA13, author = {Ziming Zhao and Gail{-}Joon Ahn}, title = {Using instruction sequence abstraction for shellcode detection and attribution}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {323--331}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682722}, doi = {10.1109/CNS.2013.6682722}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhaoA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/PaglieraniMA13, author = {Justin Paglierani and Mike Mabey and Gail{-}Joon Ahn}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Towards comprehensive and collaborative forensics on email evidence}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {11--20}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254125}, doi = {10.4108/ICST.COLLABORATECOM.2013.254125}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/PaglieraniMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/Rubio-MedranoDA13, author = {Carlos E. Rubio{-}Medrano and Clinton D'Souza and Gail{-}Joon Ahn}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Supporting secure collaborations with attribute-based access control}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {525--530}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254168}, doi = {10.4108/ICST.COLLABORATECOM.2013.254168}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/Rubio-MedranoDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Rubio-MedranoAS13, author = {Carlos E. Rubio{-}Medrano and Gail{-}Joon Ahn and Karsten Sohr}, title = {Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned}, booktitle = {37th Annual {IEEE} Computer Software and Applications Conference, {COMPSAC} 2013, Kyoto, Japan, July 22-26, 2013}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/COMPSAC.2013.7}, doi = {10.1109/COMPSAC.2013.7}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/Rubio-MedranoAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HanMA13, author = {Wonkyu Han and Mike Mabey and Gail{-}Joon Ahn}, title = {Simulation-based validation for smart grid environments}, booktitle = {{IEEE} 14th International Conference on Information Reuse {\&} Integration, {IRI} 2013, San Francisco, CA, USA, August 14-16, 2013}, pages = {14--21}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IRI.2013.6642448}, doi = {10.1109/IRI.2013.6642448}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/HanMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HanMAK13, author = {Wonkyu Han and Mike Mabey and Gail{-}Joon Ahn and Tae Sung Kim}, editor = {Thouraya Bouabana{-}Tebibel and Stuart H. Rubin}, title = {Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results}, booktitle = {Integration of Reusable Systems [extended versions of the best papers which were presented at {IEEE} International Conference on Information Reuse and Integration and {IEEE} International Workshop on Formal Methods Integration, San Francisco, CA, USA, August 2013]}, series = {Advances in Intelligent Systems and Computing}, volume = {263}, pages = {27--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04717-1\_2}, doi = {10.1007/978-3-319-04717-1\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/HanMAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/WuZASX13, author = {Ruoyu Wu and Xinwen Zhang and Gail{-}Joon Ahn and Hadi Sharifi and Haiyong Xie}, title = {ACaaS: Access Control as a Service for IaaS Cloud}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {423--428}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.66}, doi = {10.1109/SOCIALCOM.2013.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/WuZASX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhaoASH13, author = {Ziming Zhao and Gail{-}Joon Ahn and Jeong{-}Jin Seo and Hongxin Hu}, editor = {Samuel T. King}, title = {On the Security of Picture Gesture Authentication}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {383--398}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/zhao}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhaoASH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhuYHAZ12, author = {Yan Zhu and Mengyang Yu and Hongxin Hu and Gail{-}Joon Ahn and Hong{-}Jia Zhao}, title = {Efficient construction of provably secure steganography under ordinary covert channels}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {7}, pages = {1639--1649}, year = {2012}, url = {https://doi.org/10.1007/s11432-012-4598-3}, doi = {10.1007/S11432-012-4598-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhuYHAZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShehabSAK12, author = {Mohamed Shehab and Anna Cinzia Squicciarini and Gail{-}Joon Ahn and Irini Kokkinou}, title = {Access control for online social networks third party applications}, journal = {Comput. Secur.}, volume = {31}, number = {8}, pages = {897--911}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.07.008}, doi = {10.1016/J.COSE.2012.07.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShehabSAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/ZhuWHAM12, author = {Yan Zhu and Shan{-}Biao Wang and Hongxin Hu and Gail{-}Joon Ahn and Di Ma}, title = {Secure Collaborative Integrity Verification for Hybrid Cloud Environments}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {21}, number = {3}, pages = {165--198}, year = {2012}, url = {https://doi.org/10.1142/S0218843012410018}, doi = {10.1142/S0218843012410018}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/ZhuWHAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmam/WuAH12, author = {Ruoyu Wu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Towards HIPAA-Compliant Healthcare Systems in Cloud Computing}, journal = {Int. J. Comput. Model. Algorithms Medicine}, volume = {3}, number = {2}, pages = {1--22}, year = {2012}, url = {https://doi.org/10.4018/jcmam.2012040101}, doi = {10.4018/JCMAM.2012040101}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmam/WuAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/SohrKGHA12, author = {Karsten Sohr and Mirco Kuhlmann and Martin Gogolla and Hongxin Hu and Gail{-}Joon Ahn}, title = {Comprehensive two-level analysis of role-based delegation and revocation policies with {UML} and {OCL}}, journal = {Inf. Softw. Technol.}, volume = {54}, number = {12}, pages = {1396--1417}, year = {2012}, url = {https://doi.org/10.1016/j.infsof.2012.06.008}, doi = {10.1016/J.INFSOF.2012.06.008}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/SohrKGHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AhnJS12, author = {Gail{-}Joon Ahn and Jing Jin and Mohamed Shehab}, title = {Policy-driven role-based access management for ad-hoc collaboration}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {223--257}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0446}, doi = {10.3233/JCS-2012-0446}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AhnJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhuHAY12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Stephen S. Yau}, title = {Efficient audit service outsourcing for data integrity in clouds}, journal = {J. Syst. Softw.}, volume = {85}, number = {5}, pages = {1083--1095}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.12.024}, doi = {10.1016/J.JSS.2011.12.024}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhuHAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ClaycombSA12, author = {William R. Claycomb and Dongwan Shin and Gail{-}Joon Ahn}, title = {Enhancing directory virtualization to detect insider activity}, journal = {Secur. Commun. Networks}, volume = {5}, number = {8}, pages = {873--886}, year = {2012}, url = {https://doi.org/10.1002/sec.362}, doi = {10.1002/SEC.362}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ClaycombSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoHAW12, author = {Ziming Zhao and Hongxin Hu and Gail{-}Joon Ahn and Ruoyu Wu}, title = {Risk-Aware Mitigation for {MANET} Routing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {250--260}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.51}, doi = {10.1109/TDSC.2011.51}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoHAW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuAK12, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, title = {Detecting and Resolving Firewall Policy Anomalies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {318--331}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.20}, doi = {10.1109/TDSC.2012.20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuZHAS12, author = {Wenjuan Xu and Xinwen Zhang and Hongxin Hu and Gail{-}Joon Ahn and Jean{-}Pierre Seifert}, title = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {429--442}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.61}, doi = {10.1109/TDSC.2011.61}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhuHAY12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Mengyang Yu}, title = {Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {23}, number = {12}, pages = {2231--2244}, year = {2012}, url = {https://doi.org/10.1109/TPDS.2012.66}, doi = {10.1109/TPDS.2012.66}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/ZhuHAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhuHAYZ12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Mengyang Yu and Hong{-}Jia Zhao}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Comparison-based encryption for fine-grained access control in clouds}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {105--116}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133614}, doi = {10.1145/2133601.2133614}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhuHAYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/WuAH12, author = {Ruoyu Wu and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Secure sharing of electronic health records in clouds}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {711--718}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250497}, doi = {10.4108/ICST.COLLABORATECOM.2012.250497}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/WuAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhaoAHM12, author = {Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu and Deepinder Mahi}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {SocialImpact: Systematic Analysis of Underground Social Dynamics}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {877--894}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_50}, doi = {10.1007/978-3-642-33167-1\_50}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhaoAHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HuAJ12, author = {Hongxin Hu and Gail{-}Joon Ahn and Jan Jorgensen}, title = {Enabling Collaborative data sharing in Google+}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {720--725}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503198}, doi = {10.1109/GLOCOM.2012.6503198}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HuAJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuWMHA12, author = {Yan Zhu and Shan{-}Biao Wang and Di Ma and Hongxin Hu and Gail{-}Joon Ahn}, title = {Secure and efficient constructions of hash, {MAC} and {PRF} for mobile devices}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {949--954}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503235}, doi = {10.1109/GLOCOM.2012.6503235}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhuWMHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihi/WuAH12, author = {Ruoyu Wu and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Gang Luo and Jiming Liu and Christopher C. Yang}, title = {Towards HIPAA-compliant healthcare systems}, booktitle = {{ACM} International Health Informatics Symposium, {IHI} '12, Miami, FL, USA, January 28-30, 2012}, pages = {593--602}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2110363.2110429}, doi = {10.1145/2110363.2110429}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ihi/WuAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhuHAHW12, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Dijiang Huang and Shan{-}Biao Wang}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Towards temporal access control in cloud computing}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2576--2580}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195656}, doi = {10.1109/INFCOM.2012.6195656}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhuHAHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JingAH12, author = {Yiming Jing and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Model-Based Conformance Testing for Android}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_1}, doi = {10.1007/978-3-642-34117-5\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JingAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhuWHAH11, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu}, title = {Zero-knowledge proofs of retrievability}, journal = {Sci. China Inf. Sci.}, volume = {54}, number = {8}, pages = {1608--1617}, year = {2011}, url = {https://doi.org/10.1007/s11432-011-4293-9}, doi = {10.1007/S11432-011-4293-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhuWHAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinAHCZ11, author = {Jing Jin and Gail{-}Joon Ahn and Hongxin Hu and Michael J. Covington and Xinwen Zhang}, title = {Patient-centric authorization framework for electronic healthcare services}, journal = {Comput. Secur.}, volume = {30}, number = {2-3}, pages = {116--127}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.09.001}, doi = {10.1016/J.COSE.2010.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinAHCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JinA11, author = {Jing Jin and Gail{-}Joon Ahn}, title = {Assured resource sharing in Grid environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {215--233}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040181}, doi = {10.1504/IJICS.2011.040181}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JinA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/AhnSS11, author = {Gail{-}Joon Ahn and Mohamed Shehab and Anna Cinzia Squicciarini}, title = {Security and Privacy in Social Networks}, journal = {{IEEE} Internet Comput.}, volume = {15}, number = {3}, pages = {10--12}, year = {2011}, url = {https://doi.org/10.1109/MIC.2011.66}, doi = {10.1109/MIC.2011.66}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/AhnSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhuHAWW11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Huaixi Wang and Shan{-}Biao Wang}, title = {Provably Secure Role-Based Encryption with Revocation Mechanism}, journal = {J. Comput. Sci. Technol.}, volume = {26}, number = {4}, pages = {697--710}, year = {2011}, url = {https://doi.org/10.1007/s11390-011-1169-9}, doi = {10.1007/S11390-011-1169-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZhuHAWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuAJ11, author = {Hongxin Hu and Gail{-}Joon Ahn and Jan Jorgensen}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Detecting and resolving privacy conflicts for collaborative data sharing in online social networks}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {103--112}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076747}, doi = {10.1145/2076732.2076747}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HuAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuHAGC11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Xiaorui Gong and Shimin Chen}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: temporal attribute-based encryption in clouds}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {881--884}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093517}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuHAGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhuHAHC11, author = {Yan Zhu and Hongxin Hu and Gail{-}Joon Ahn and Yujing Han and Shimin Chen}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {Collaborative integrity verification in hybrid clouds}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {191--200}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247089}, doi = {10.4108/ICST.COLLABORATECOM.2011.247089}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZhuHAHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/HuAK11, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {Ontology-based policy anomaly management for autonomic computing}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {487--494}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247119}, doi = {10.4108/ICST.COLLABORATECOM.2011.247119}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/HuAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/PaxtonAS11, author = {Napoleon Paxton and Gail{-}Joon Ahn and Mohamed Shehab}, title = {MasterBlaster: Identifying Influential Players in Botnet Transactions}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {413--419}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.61}, doi = {10.1109/COMPSAC.2011.61}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/PaxtonAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HuA11, author = {Hongxin Hu and Gail{-}Joon Ahn}, editor = {Yingjiu Li}, title = {Multiparty Authorization Framework for Data Sharing in Online Social Networks}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {29--43}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_5}, doi = {10.1007/978-3-642-22348-8\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HuA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhaoAH11, author = {Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, title = {Examining Social Dynamics for Countering Botnet Attacks}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6134468}, doi = {10.1109/GLOCOM.2011.6134468}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhaoAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AhnS11, author = {Gail{-}Joon Ahn and Pradeep Sekar}, title = {Ontology-Based Risk Evaluation in User-Centric Identity Management}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5962948}, doi = {10.1109/ICC.2011.5962948}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AhnS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/Ahn11, author = {Gail{-}Joon Ahn}, title = {Securing and utilizing social dynamics}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada, {USA}}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2011}, url = {https://doi.org/10.1109/IRI.2011.6009507}, doi = {10.1109/IRI.2011.6009507}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iri/Ahn11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/MabeyA11, author = {Mike Mabey and Gail{-}Joon Ahn}, title = {Towards collaborative forensics: Preliminary framework}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada, {USA}}, pages = {94--99}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2011}, url = {https://doi.org/10.1109/IRI.2011.6009527}, doi = {10.1109/IRI.2011.6009527}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/MabeyA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZhuWHAHY11, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Dynamic audit services for integrity verification of outsourced storages in clouds}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {1550--1557}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982514}, doi = {10.1145/1982185.1982514}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ZhuWHAHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HuAK11, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, editor = {Ruth Breu and Jason Crampton and Jorge Lobo}, title = {Anomaly discovery and resolution in web access control policies}, booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings}, pages = {165--174}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998441.1998472}, doi = {10.1145/1998441.1998472}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HuAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ZhaoAH11, author = {Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Martin Pinzger and Denys Poshyvanyk and Jim Buckley}, title = {Automatic Extraction of Secrets from Malware}, booktitle = {18th Working Conference on Reverse Engineering, {WCRE} 2011, Limerick, Ireland, October 17-20, 2011}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WCRE.2011.27}, doi = {10.1109/WCRE.2011.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/ZhaoAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {Security and Privacy Challenges in Cloud Computing Environments}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {24--31}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.186}, doi = {10.1109/MSP.2010.186}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/HuA10, author = {Hongxin Hu and Gail{-}Joon Ahn}, title = {Constructing Authorization Systems Using Assurance Management Framework}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {40}, number = {4}, pages = {396--405}, year = {2010}, url = {https://doi.org/10.1109/TSMCC.2010.2047856}, doi = {10.1109/TSMCC.2010.2047856}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/HuA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuAHW10, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Huaixi Wang}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Cryptographic role-based security mechanisms based on role-key hierarchy}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {314--319}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755728}, doi = {10.1145/1755688.1755728}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuAHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuWHAHY10, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Efficient provable data possession for hybrid clouds}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {756--758}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866421}, doi = {10.1145/1866307.1866421}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuWHAHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/WuAHS10, author = {Ruoyu Wu and Gail{-}Joon Ahn and Hongxin Hu and Mukesh Singhal}, editor = {Karl Aberer and James Joshi}, title = {Information flow control in cloud computing}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--7}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.trustcol.2010.1}, doi = {10.4108/ICST.TRUSTCOL.2010.1}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/WuAHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhuHWHA10, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail{-}Joon Ahn}, editor = {Karl Aberer and James Joshi}, title = {A collaborative framework for privacy protection in online social networks}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.52}, doi = {10.4108/ICST.COLLABORATECOM.2010.52}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/ZhuHWHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/AhnHLM10, author = {Gail{-}Joon Ahn and Hongxin Hu and Joohyung Lee and Yunsong Meng}, editor = {Sheikh Iqbal Ahamed and Doo{-}Hwan Bae and Sung Deok Cha and Carl K. Chang and Rajesh Subramanyan and W. Eric Wong and Hen{-}I Yang}, title = {Representing and Reasoning about Web Access Control Policies}, booktitle = {Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2010, Seoul, Korea, 19-23 July 2010}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSAC.2010.20}, doi = {10.1109/COMPSAC.2010.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/AhnHLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments}, booktitle = {Workshop Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul, Korea, 19-23 July 2010}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSACW.2010.74}, doi = {10.1109/COMPSACW.2010.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuAHZS10, author = {Wenjuan Xu and Gail{-}Joon Ahn and Hongxin Hu and Xinwen Zhang and Jean{-}Pierre Seifert}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {DR@FT: Efficient Remote Attestation Framework for Dynamic Systems}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {182--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_12}, doi = {10.1007/978-3-642-15497-3\_12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/XuAHZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhaoHAW10, author = {Ziming Zhao and Hongxin Hu and Gail{-}Joon Ahn and Ruoyu Wu}, title = {Risk-Aware Response for Mitigating {MANET} Routing Attacks}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683548}, doi = {10.1109/GLOCOM.2010.5683548}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhaoHAW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/HuAK10, author = {Hongxin Hu and Gail{-}Joon Ahn and Ketan Kulkarni}, editor = {Tony Sager and Gail{-}Joon Ahn and Krishna Kant and Heather Richter Lipford}, title = {{FAME:} a firewall anomaly management environment}, booktitle = {3rd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010}, pages = {17--26}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866898.1866902}, doi = {10.1145/1866898.1866902}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/HuAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2010, editor = {Tony Sager and Gail{-}Joon Ahn and Krishna Kant and Heather Richter Lipford}, title = {3rd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1866898}, isbn = {978-1-4503-0093-3}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuAHW10, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Huaixi Wang}, title = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2010}, url = {http://eprint.iacr.org/2010/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuWHAHY10, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, title = {Efficient provable data possession for hybrid clouds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2010}, url = {http://eprint.iacr.org/2010/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuHWHA10, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail{-}Joon Ahn}, title = {A Collaborative Framework for Privacy Protection in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2010}, url = {http://eprint.iacr.org/2010/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/AhnHJ09, author = {Gail{-}Joon Ahn and Hongxin Hu and Jing Jin}, title = {Security-Enhanced OSGi Service Environments}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {39}, number = {5}, pages = {562--571}, year = {2009}, url = {https://doi.org/10.1109/TSMCC.2009.2020437}, doi = {10.1109/TSMCC.2009.2020437}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/AhnHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ShinLCA09, author = {Dongwan Shin and Rodrigo Lopes and William R. Claycomb and Gail{-}Joon Ahn}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Ming Hua and Rajesh Subramanyan}, title = {A Framework for Enabling User-Controlled Persona in Online Social Networks}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1}, pages = {292--297}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.46}, doi = {10.1109/COMPSAC.2009.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ShinLCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/XuZA09, author = {Wenjuan Xu and Xinwen Zhang and Gail{-}Joon Ahn}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Towards System Integrity Protection with Graph-Based Policy Analysis}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {65--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_5}, doi = {10.1007/978-3-642-03007-9\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/XuZA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/JinA09, author = {Jing Jin and Gail{-}Joon Ahn}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Stephen S. Yau and Osvaldo Gervasi and Byeong{-}Ho Kang}, title = {Authorization Framework for Resource Sharing in Grid Environments}, booktitle = {Grid and Distributed Computing - International Conference, {GDC} 2009, Held as Part of the Future Generation Information Technology Conferences, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {63}, pages = {148--155}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10549-4\_18}, doi = {10.1007/978-3-642-10549-4\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/JinA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AhnKS09, author = {Gail{-}Joon Ahn and Moonam Ko and Mohamed Shehab}, title = {Privacy-Enhanced User-Centric Identity Management}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199363}, doi = {10.1109/ICC.2009.5199363}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AhnKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JinAHCZ09, author = {Jing Jin and Gail{-}Joon Ahn and Hongxin Hu and Michael J. Covington and Xinwen Zhang}, editor = {Barbara Carminati and James Joshi}, title = {Patient-centric authorization framework for sharing electronic health records}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {125--134}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542228}, doi = {10.1145/1542207.1542228}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/JinAHCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/Ahn09, author = {Gail{-}Joon Ahn}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Discretionary Access Control}, booktitle = {Encyclopedia of Database Systems}, pages = {864--866}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_135}, doi = {10.1007/978-0-387-39940-9\_135}, timestamp = {Sun, 02 Jun 2019 21:10:27 +0200}, biburl = {https://dblp.org/rec/reference/db/Ahn09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HongAX08, author = {Seng{-}Phil Hong and Gail{-}Joon Ahn and Wenjuan Xu}, title = {Access Control Management for {SCADA} Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {10}, pages = {2449--2457}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.10.2449}, doi = {10.1093/IETISY/E91-D.10.2449}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HongAX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SohrDAG08, author = {Karsten Sohr and Michael Drouineaud and Gail{-}Joon Ahn and Martin Gogolla}, title = {Analyzing and Managing Role-Based Access Control Policies}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {20}, number = {7}, pages = {924--939}, year = {2008}, url = {https://doi.org/10.1109/TKDE.2008.28}, doi = {10.1109/TKDE.2008.28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SohrDAG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SohrMBA08, author = {Karsten Sohr and Tanveer Mustafa and Xinyu Bao and Gail{-}Joon Ahn}, title = {Enforcing Role-Based Access Control Policies in Web Services with {UML} and {OCL}}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {257--266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.35}, doi = {10.1109/ACSAC.2008.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SohrMBA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JinACZ08, author = {Jing Jin and Gail{-}Joon Ahn and Michael J. Covington and Xinwen Zhang}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Access Control Model for Sharing Composite Electronic Health Records}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {340--354}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_25}, doi = {10.1007/978-3-642-03354-4\_25}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JinACZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/IwaiharaMAY08, author = {Mizuho Iwaihara and Kohei Murakami and Gail{-}Joon Ahn and Masatoshi Yoshikawa}, editor = {Qing Li and Stefano Spaccapietra and Eric S. K. Yu and Antoni Oliv{\'{e}}}, title = {Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology}, booktitle = {Conceptual Modeling - {ER} 2008, 27th International Conference on Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5231}, pages = {183--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87877-3\_15}, doi = {10.1007/978-3-540-87877-3\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/IwaiharaMAY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftdcs/AhnHJ08, author = {Gail{-}Joon Ahn and Hongxin Hu and Jing Jin}, title = {Towards Role-Based Authorization for OSGi Service Environments}, booktitle = {12th {IEEE} International Workshop on Future Trends of Distributed Computing Systems, {FTDCS} 2008, Kunming, China, October 21-23, 2008}, pages = {23--29}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FTDCS.2008.43}, doi = {10.1109/FTDCS.2008.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ftdcs/AhnHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ShehabSA08, author = {Mohamed Shehab and Anna Cinzia Squicciarini and Gail{-}Joon Ahn}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Beyond User-to-User Access Control for Online Social Networks}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {174--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_12}, doi = {10.1007/978-3-540-88625-9\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ShehabSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/AhnXZ08, author = {Gail{-}Joon Ahn and Wenjuan Xu and Xinwen Zhang}, title = {Systematic Policy Analysis for High-Assurance Services in SELinux}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.18}, doi = {10.1109/POLICY.2008.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/AhnXZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XuSA08, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, editor = {Indrakshi Ray and Ninghui Li}, title = {Visualization based policy analysis: case study in SELinux}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {165--174}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377863}, doi = {10.1145/1377836.1377863}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/XuSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HuA08, author = {Hongxin Hu and Gail{-}Joon Ahn}, editor = {Indrakshi Ray and Ninghui Li}, title = {Enabling verification and conformance testing for access control model}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {195--204}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377867}, doi = {10.1145/1377836.1377867}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HuA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AhnKS08, author = {Gail{-}Joon Ahn and Moonam Ko and Mohamed Shehab}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Portable User-Centric Identity Management}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {573--587}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_37}, doi = {10.1007/978-0-387-09699-5\_37}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AhnKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhnMH07, author = {Gail{-}Joon Ahn and Badrinath Mohan and Seng{-}Phil Hong}, title = {Towards secure information sharing using role-based delegation}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {42--59}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.004}, doi = {10.1016/J.JNCA.2005.08.004}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhnMH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sopr/LeeGA07, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Certification process artifacts defined as measurable units for software assurance}, journal = {Softw. Process. Improv. Pract.}, volume = {12}, number = {2}, pages = {165--189}, year = {2007}, url = {https://doi.org/10.1002/spip.313}, doi = {10.1002/SPIP.313}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sopr/LeeGA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ahn07, author = {Gail{-}Joon Ahn}, title = {Guest editorial: Special issue on access control models and technologies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {1}, pages = {1}, year = {2007}, url = {https://doi.org/10.1145/1210263.1216576}, doi = {10.1145/1210263.1216576}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ahn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/ChuABDKYY07, author = {Bei{-}tseng Chu and Gail{-}Joon Ahn and Steven Blanchard and James Deese and Richard Kelly and Huiming Yu and Ashika Young}, title = {Collegiate Cyber Game Design Criteria and Participation}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {1036--1041}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.80}, doi = {10.1109/ICIS.2007.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/ChuABDKYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TeoA07, author = {Lawrence Teo and Gail{-}Joon Ahn}, editor = {Feng Bao and Steven Miller}, title = {Managing heterogeneous network environments using an extensible policy framework}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {362--364}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229328}, doi = {10.1145/1229285.1229328}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TeoA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JinASH07, author = {Jing Jin and Gail{-}Joon Ahn and Mohamed Shehab and Hongxin Hu}, editor = {Juan Quemada and Tao Zhang}, title = {Towards trust-aware access management for ad-hoc collaborations}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {41--48}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553807}, doi = {10.1109/COLCOM.2007.4553807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JinASH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/AhnK07, author = {Gail{-}Joon Ahn and Moonam Ko}, editor = {Juan Quemada and Tao Zhang}, title = {User-centric privacy management for federated identity management}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {187--195}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553829}, doi = {10.1109/COLCOM.2007.4553829}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/AhnK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/PaxtonAC07, author = {Napoleon Paxton and Gail{-}Joon Ahn and Bill Chu}, title = {Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada, {USA}}, pages = {73--78}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2007}, url = {https://doi.org/10.1109/IRI.2007.4296600}, doi = {10.1109/IRI.2007.4296600}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/PaxtonAC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/AhnG07, author = {Gail{-}Joon Ahn and Dhruv Gami}, title = {Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux}, booktitle = {Proceedings of the 12th {IEEE} Symposium on Computers and Communications {(ISCC} 2007), July 1-4, Aveiro, Portugal}, pages = {865--870}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ISCC.2007.4381574}, doi = {10.1109/ISCC.2007.4381574}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/AhnG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/TeoA07, author = {Lawrence Teo and Gail{-}Joon Ahn}, title = {Towards Effective Security Policy Management for Heterogeneous Network Environments}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {241--245}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.44}, doi = {10.1109/POLICY.2007.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/TeoA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AhnH07, author = {Gail{-}Joon Ahn and Hongxin Hu}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Towards realizing a formal {RBAC} model in real systems}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {215--224}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266875}, doi = {10.1145/1266840.1266875}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AhnH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2007, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0}, doi = {10.1007/978-3-540-73538-0}, isbn = {978-3-540-73533-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/LeeMGYA06, author = {Seok Won Lee and Divya Muthurajan and Robin A. Gandhi and Deepak S. Yavagal and Gail{-}Joon Ahn}, title = {Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {16}, number = {6}, pages = {851--884}, year = {2006}, url = {https://doi.org/10.1142/S0218194006003051}, doi = {10.1142/S0218194006003051}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/LeeMGYA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JinA06, author = {Jing Jin and Gail{-}Joon Ahn}, editor = {Enrico Blanzieri and Tao Zhang}, title = {Towards Secure Information Sharing and Management in Grid Environments}, booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2006}, url = {https://doi.org/10.1109/COLCOM.2006.361892}, doi = {10.1109/COLCOM.2006.361892}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/JinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbtw/JinAS06, author = {Jing Jin and Gail{-}Joon Ahn and Mukesh Singhal}, editor = {Torsten Grust and Hagen H{\"{o}}pfner and Arantza Illarramendi and Stefan Jablonski and Marco Mesiti and Sascha M{\"{u}}ller and Paula{-}Lavinia Patranjan and Kai{-}Uwe Sattler and Myra Spiliopoulou and Jef Wijsen}, title = {ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing}, booktitle = {Current Trends in Database Technology - {EDBT} 2006, {EDBT} 2006 Workshops PhD, DataX, IIDB, IIHA, ICSNW, QLQP, PIM, PaRMA, and Reactivity on the Web, Munich, Germany, March 26-31, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4254}, pages = {724--740}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11896548\_55}, doi = {10.1007/11896548\_55}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edbtw/JinAS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeGMYA06, author = {Seok Won Lee and Robin A. Gandhi and Divya Muthurajan and Deepak S. Yavagal and Gail{-}Joon Ahn}, editor = {Danilo Bruschi and Bart De Win and Mattia Monga}, title = {Building problem domain ontology from security requirements in regulatory documents}, booktitle = {Proceedings of the 2006 international workshop on Software engineering for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006}, pages = {43--50}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1137627.1137635}, doi = {10.1145/1137627.1137635}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LeeGMYA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JinA06, author = {Jing Jin and Gail{-}Joon Ahn}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Role-based access management for ad-hoc collaborative sharing}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {200--209}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133086}, doi = {10.1145/1133058.1133086}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/JinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ShinA05, author = {Dongwan Shin and Gail{-}Joon Ahn}, title = {Role-based privilege and trust management}, journal = {Comput. Syst. Sci. Eng.}, volume = {20}, number = {6}, year = {2005}, timestamp = {Tue, 20 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ShinA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ToloneAPH05, author = {William J. Tolone and Gail{-}Joon Ahn and Tanusree Pai and Seng{-}Phil Hong}, title = {Access control in collaborative systems}, journal = {{ACM} Comput. Surv.}, volume = {37}, number = {1}, pages = {29--41}, year = {2005}, url = {https://doi.org/10.1145/1057977.1057979}, doi = {10.1145/1057977.1057979}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ToloneAPH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/LeeGA05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Establishing trustworthiness in services of the critical infrastructure through certification and accreditation}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {30}, number = {4}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.1145/1082983.1083205}, doi = {10.1145/1082983.1083205}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/LeeGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/SohrAM05, author = {Karsten Sohr and Gail{-}Joon Ahn and Lars Migge}, title = {Articulating and enforcing authorisation policies with {UML} and {OCL}}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {30}, number = {4}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.1145/1082983.1083215}, doi = {10.1145/1082983.1083215}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/SohrAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/YavagalLAG05, author = {Deepak S. Yavagal and Seok Won Lee and Gail{-}Joon Ahn and Robin A. Gandhi}, editor = {M{\'{a}}rio Guimar{\~{a}}es}, title = {Common criteria requirements modeling and its uses for quality of information assurance (QoIA)}, booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2}, pages = {130--135}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1167253.1167287}, doi = {10.1145/1167253.1167287}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/YavagalLAG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/TeoA05, author = {Lawrence Teo and Gail{-}Joon Ahn}, editor = {M{\'{a}}rio Guimar{\~{a}}es}, title = {Supporting access control policies across multiple operating systems}, booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2}, pages = {288--293}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1167253.1167317}, doi = {10.1145/1167253.1167317}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/TeoA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/AhnL05, author = {Gail{-}Joon Ahn and John Lam}, editor = {Vijay Atluri and Pierangela Samarati and Atsuhiro Goto}, title = {Managing privacy preferences for federated identity management}, booktitle = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005}, pages = {28--36}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102486.1102492}, doi = {10.1145/1102486.1102492}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/AhnL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SohrAGM05, author = {Karsten Sohr and Gail{-}Joon Ahn and Martin Gogolla and Lars Migge}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Specification and Validation of Authorisation Constraints Using {UML} and {OCL}}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {64--79}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_5}, doi = {10.1007/11555827\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SohrAGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeGA05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Establishing trustworthiness in services of the critical infrastructure through certification and accreditation}, booktitle = {Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis, Missouri, USA, May 15-16, 2005}, pages = {1--7}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1083200.1083205}, doi = {10.1145/1083200.1083205}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LeeGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SohrAM05, author = {Karsten Sohr and Gail{-}Joon Ahn and Lars Migge}, title = {Articulating and enforcing authorisation policies with {UML} and {OCL}}, booktitle = {Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis, Missouri, USA, May 15-16, 2005}, pages = {1--7}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1083200.1083215}, doi = {10.1145/1083200.1083215}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SohrAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeeGAY05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn and Deepak S. Yavagal}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {Active Automation of the {DITSCAP}}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {479--485}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_46}, doi = {10.1007/11427995\_46}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeeGAY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SohrDA05, author = {Karsten Sohr and Michael Drouineaud and Gail{-}Joon Ahn}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {Formal specification of role-based security policies for clinical information systems}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {332--339}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066756}, doi = {10.1145/1066677.1066756}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SohrDA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/FosterSA05, author = {Joshua Foster and Kalpathi R. Subramanian and Gail{-}Joon Ahn}, editor = {Robert F. Erbacher and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Interactive exploration of large filesystems}, booktitle = {Visualization and Data Analysis 2005, San Jose, CA, USA, January 17, 2005}, series = {{SPIE} Proceedings}, volume = {5669}, pages = {307--315}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.589656}, doi = {10.1117/12.589656}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/FosterSA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2005, editor = {Elena Ferrari and Gail{-}Joon Ahn}, title = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1063979}, doi = {10.1145/1063979}, isbn = {1-59593-045-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ShinACJ04, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho and Seunghun Jin}, title = {A role-based infrastructure management system: design and implementation}, journal = {Concurr. Pract. Exp.}, volume = {16}, number = {11}, pages = {1121--1141}, year = {2004}, url = {https://doi.org/10.1002/cpe.807}, doi = {10.1002/CPE.807}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ShinACJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCApdcs/ShinA04, author = {Dongwan Shin and Gail{-}Joon Ahn}, editor = {David A. Bader and Ashfaq A. Khokhar}, title = {Role-based Trust Assignment in Trust Management Systems}, booktitle = {Proceedings of the {ISCA} 17th International Conference on Parallel and Distributed Computing Systems, September 15-17, 2004, The Canterbury Hotel, San Francisco, California, {USA}}, pages = {551--558}, publisher = {{ISCA}}, year = {2004}, timestamp = {Mon, 09 Aug 2021 16:35:42 +0200}, biburl = {https://dblp.org/rec/conf/ISCApdcs/ShinA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infovis/FosterSHA04, author = {Joshua Foster and Kalpathi R. Subramanian and Robert Herring and Gail{-}Joon Ahn}, editor = {Matthew O. Ward and Tamara Munzner}, title = {Interactive Exploration of the {AFS} File System}, booktitle = {10th {IEEE} Symposium on Information Visualization (InfoVis 2004), 10-12 October 2004, Austin, TX, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/INFVIS.2004.40}, doi = {10.1109/INFVIS.2004.40}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/infovis/FosterSHA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/ShinAS04, author = {Dongwan Shin and Gail{-}Joon Ahn and Prasad Shenoy}, title = {Ensuring information assurance in federated identity management}, booktitle = {Proceedings of the 23rd {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix, Arizona, {USA}}, pages = {821--826}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/PCCC.2004.1395193}, doi = {10.1109/PCCC.2004.1395193}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/ShinAS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/AhnM04, author = {Gail{-}Joon Ahn and Badrinath Mohan}, title = {Secure Information Sharing Using Role-based Delegation}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {810--819}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286758}, doi = {10.1109/ITCC.2004.1286758}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/AhnM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TeoSA04, author = {Lawrence Teo and Yu{-}An Sun and Gail{-}Joon Ahn}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Defeating Internet Attacks Using Risk Awareness and Active Honeypots}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {155--168}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288045}, doi = {10.1109/IWIA.2004.1288045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TeoSA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/AhnandH04, author = {Gail{-}Joon Ahn and Seng{-}Phil Hong}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Group Hierarchies with Constrained User Assignment in Linux}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {13--22}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Mon, 13 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sis/AhnandH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AhnSZ04, author = {Gail{-}Joon Ahn and Dongwan Shin and Longhua Zhang}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Role-Based Privilege Management Using Attribute Certificates and Delegation}, booktitle = {Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3184}, pages = {100--109}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30079-3\_11}, doi = {10.1007/978-3-540-30079-3\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AhnSZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/AhnSH04, author = {Gail{-}Joon Ahn and Dongwan Shin and Seng{-}Phil Hong}, editor = {Xiaofang Zhou and Stanley Y. W. Su and Mike P. Papazoglou and Maria E. Orlowska and Keith G. Jeffery}, title = {Information Assurance in Federated Identity Management: Experimentations and Issues}, booktitle = {Web Information Systems - {WISE} 2004, 5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3306}, pages = {78--89}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30480-7\_10}, doi = {10.1007/978-3-540-30480-7\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/AhnSH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangAC03, author = {Longhua Zhang and Gail{-}Joon Ahn and Bei{-}tseng Chu}, title = {A rule-based framework for role-based delegation and revocation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {404--441}, year = {2003}, url = {https://doi.org/10.1145/937527.937530}, doi = {10.1145/937527.937530}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/TeoZA03, author = {Lawrence Teo and Yuliang Zheng and Gail{-}Joon Ahn}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {73--88}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192460}, doi = {10.1109/IWIAS.2003.1192460}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/TeoZA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AhnM03, author = {Gail{-}Joon Ahn and Badrinath Mohan}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Role-Based Authorization in Decentralized Health Care Environments}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {251--256}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952584}, doi = {10.1145/952532.952584}, timestamp = {Tue, 06 Nov 2018 11:06:45 +0100}, biburl = {https://dblp.org/rec/conf/sac/AhnM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShinACJ03, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho and Seunghun Jin}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {325--330}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952598}, doi = {10.1145/952532.952598}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ShinACJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FerraioloCAG03, author = {David F. Ferraiolo and Ramaswamy Chandramouli and Gail{-}Joon Ahn and Serban I. Gavrila}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {The role control center: features and case studies}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {12--20}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775415}, doi = {10.1145/775412.775415}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/FerraioloCAG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ShinACJ03, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho and Seunghun Jin}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {On modeling system-centric information for role engineering}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {169--178}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775434}, doi = {10.1145/775412.775434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ShinACJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TeoAZ03, author = {Lawrence Teo and Gail{-}Joon Ahn and Yuliang Zheng}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Dynamic and risk-aware network access management}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {217--230}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775441}, doi = {10.1145/775412.775441}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TeoAZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhangA03, author = {Longhua Zhang and Gail{-}Joon Ahn}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Constrained Role-based Delegation}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {289--300}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 10:12:34 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZhangA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/ToloneGA03, author = {William J. Tolone and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Locale-based access control: placing collaborative authorization decisions in context}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {4120--4127}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1245632}, doi = {10.1109/ICSMC.2003.1245632}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/ToloneGA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/AhnZSC03, author = {Gail{-}Joon Ahn and Longhua Zhang and Dongwan Shin and Bill Chu}, title = {Authorization management for role-based collaboration}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {4128--4134}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1245633}, doi = {10.1109/ICSMC.2003.1245633}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/AhnZSC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/Ahn03, author = {Gail{-}Joon Ahn}, title = {Specification and Classification of Role-based Authorization Policies}, booktitle = {12th {IEEE} International Workshops on Enabling Technologies {(WETICE} 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria}, pages = {202--207}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ENABL.2003.1231408}, doi = {10.1109/ENABL.2003.1231408}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/Ahn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/AhnHS02, author = {Gail{-}Joon Ahn and Seng{-}Phil Hong and Michael E. Shin}, title = {Reconstructing a formal security model}, journal = {Inf. Softw. Technol.}, volume = {44}, number = {11}, pages = {649--657}, year = {2002}, url = {https://doi.org/10.1016/S0950-5849(02)00092-7}, doi = {10.1016/S0950-5849(02)00092-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/AhnHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ShinAP02, author = {Dongwan Shin and Gail{-}Joon Ahn and Joon S. Park}, title = {An Application of Directory Service Markup Language {(DSML)} for Role-Based Access Control {(RBAC)}}, booktitle = {26th International Computer Software and Applications Conference {(COMPSAC} 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings}, pages = {934--939}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CMPSAC.2002.1045125}, doi = {10.1109/CMPSAC.2002.1045125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ShinAP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ShinAC02, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Using {X.509} Attribute Certificates for Role-Based {EAM}}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {49--60}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ShinAC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip5-12/ToloneCAWS02, author = {William J. Tolone and Bei{-}tseng Chu and Gail{-}Joon Ahn and Robert G. Wilhelm and John E. Sims}, editor = {Kurt Kosanke and Roland Jochem and James G. Nell and {\'{A}}ngel Ortiz Bas}, title = {Challenges to Multi-Enterprise Integration}, booktitle = {Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, {IFIP} {TC5/WG5.12} International Conference on Enterprise Integration and Modeling Technique (ICEIMT'02), April 24-26, 2002, Valencia, Spain}, series = {{IFIP} Conference Proceedings}, volume = {236}, pages = {205--216}, publisher = {Kluwer}, year = {2002}, timestamp = {Thu, 28 Feb 2019 15:59:22 +0100}, biburl = {https://dblp.org/rec/conf/ifip5-12/ToloneCAWS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangAC02, author = {Longhua Zhang and Gail{-}Joon Ahn and Bei{-}tseng Chu}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {A role-based delegation framework for healthcare information systems}, booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002}, pages = {125--134}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/507711.507731}, doi = {10.1145/507711.507731}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangAC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/AhnS02, author = {Gail{-}Joon Ahn and Dongwan Shin}, title = {Towards Scalable Authentication in Health Services}, booktitle = {11th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2002), 10-12 June 2002, Pittsburgh, PA, {USA}}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ENABL.2002.1029993}, doi = {10.1109/ENABL.2002.1029993}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/AhnS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhnK01, author = {Gail{-}Joon Ahn and Kwangjo Kim}, title = {{CONUGA:} Constrained User-Group Assignment}, journal = {J. Netw. Comput. Appl.}, volume = {24}, number = {2}, pages = {87--100}, year = {2001}, url = {https://doi.org/10.1006/jnca.2000.0125}, doi = {10.1006/JNCA.2000.0125}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhnK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/AhnS01, author = {Gail{-}Joon Ahn and Ravi S. Sandhu}, title = {Decentralized user group assignment in Windows {NT}}, journal = {J. Syst. Softw.}, volume = {56}, number = {1}, pages = {39--49}, year = {2001}, url = {https://doi.org/10.1016/S0164-1212(00)00084-4}, doi = {10.1016/S0164-1212(00)00084-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/AhnS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkSA01, author = {Joon S. Park and Ravi S. Sandhu and Gail{-}Joon Ahn}, title = {Role-based access control on the web}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {1}, pages = {37--71}, year = {2001}, url = {https://doi.org/10.1145/383775.383777}, doi = {10.1145/383775.383777}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ParkSA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ParkAS01, author = {Joon S. Park and Gail{-}Joon Ahn and Ravi S. Sandhu}, editor = {Martin S. Olivier and David L. Spooner}, title = {Role-based Access Control on the Web Using {LDAP}}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {19--30}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 13:50:19 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ParkAS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangAC01, author = {Longhua Zhang and Gail{-}Joon Ahn and Bei{-}tseng Chu}, editor = {Ravi S. Sandhu and Trent Jaeger}, title = {A rule-based framework for role based delegation}, booktitle = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001}, pages = {153--162}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/373256.373289}, doi = {10.1145/373256.373289}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangAC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/AhnS01, author = {Gail{-}Joon Ahn and Michael E. Shin}, title = {Role-Based Authorization Constraints Specification Using Object Constraint Language}, booktitle = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge, MA, {USA}}, pages = {157--162}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ENABL.2001.953406}, doi = {10.1109/ENABL.2001.953406}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/AhnS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/Ahn00, author = {Gail{-}Joon Ahn}, title = {Role-based access control in {DCOM}}, journal = {J. Syst. Archit.}, volume = {46}, number = {13}, pages = {1175--1184}, year = {2000}, url = {https://doi.org/10.1016/S1383-7621(00)00017-5}, doi = {10.1016/S1383-7621(00)00017-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/Ahn00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhnS00, author = {Gail{-}Joon Ahn and Ravi S. Sandhu}, title = {Role-based authorization constraints specification}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {4}, pages = {207--226}, year = {2000}, url = {https://doi.org/10.1145/382912.382913}, doi = {10.1145/382912.382913}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhnS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/AhnSKP00, author = {Gail{-}Joon Ahn and Ravi S. Sandhu and Myong H. Kang and Joon S. Park}, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Injecting {RBAC} to secure a Web-based workflow system}, booktitle = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, pages = {1--10}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287.344295}, doi = {10.1145/344287.344295}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rbac/AhnSKP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/ShinA00, author = {Michael E. Shin and Gail{-}Joon Ahn}, title = {UML-Based Representation of Role-Based Access Control}, booktitle = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg, MD, {USA}}, pages = {195--200}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ENABL.2000.883728}, doi = {10.1109/ENABL.2000.883728}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/ShinA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhnS99, author = {Gail{-}Joon Ahn and Ravi S. Sandhu}, title = {Towards role-based administration in network information services}, journal = {J. Netw. Comput. Appl.}, volume = {22}, number = {3}, pages = {199--213}, year = {1999}, url = {https://doi.org/10.1006/jnca.1999.0091}, doi = {10.1006/JNCA.1999.0091}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhnS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/AhnS99, author = {Gail{-}Joon Ahn and Ravi S. Sandhu}, editor = {Charles E. Youman and Sylvia L. Osborn}, title = {The {RSL99} Language for Role-Based Separation of Duty Constraints}, booktitle = {Proceedings of the Fourth {ACM} Workshop on Role-Based Access Control, {RBAC} 1999, Fairfax, VA, USA, October 28-29, 1999}, pages = {43--54}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319171.319176}, doi = {10.1145/319171.319176}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/rbac/AhnS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.