Security and privacy challenges in cloud computing environments H Takabi, JBD Joshi, GJ Ahn IEEE Security & Privacy 8 (6), 24-31, 2010 | 1632 | 2010 |
Role-based authorization constraints specification GJ Ahn, R Sandhu ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000 | 615 | 2000 |
Cooperative provable data possession for integrity verification in multicloud storage Y Zhu, H Hu, GJ Ahn, M Yu IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012 | 554 | 2012 |
Access control in collaborative systems W Tolone, GJ Ahn, T Pai, SP Hong ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005 | 462 | 2005 |
A rule-based framework for role-based delegation and revocation L Zhang, GJ Ahn, BT Chu ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003 | 452 | 2003 |
Role-based access control on the web JS Park, R Sandhu, GJ Ahn ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001 | 388 | 2001 |
Dynamic audit services for integrity verification of outsourced storages in clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 2011 ACM Symposium on Applied Computing, 1550-1557, 2011 | 325 | 2011 |
Dynamic audit services for outsourced storages in clouds Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu IEEE Transactions on Services Computing 6 (2), 227-238, 2011 | 319 | 2011 |
FLOWGUARD: building robust firewalls for software-defined networks H Hu, W Han, GJ Ahn, Z Zhao Proceedings of the third workshop on Hot topics in software defined …, 2014 | 300 | 2014 |
Multiparty access control for online social networks: model and mechanisms H Hu, GJ Ahn, J Jorgensen IEEE Transactions on Knowledge and Data Engineering 25 (7), 1614-1627, 2012 | 235 | 2012 |
Deep android malware detection N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ... Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 205 | 2017 |
Policy-driven security management for fog computing: Preliminary framework and a case study C Dsouza, GJ Ahn, M Taguinod Proceedings of the 2014 IEEE 15th international conference on information …, 2014 | 194 | 2014 |
The RSL99 language for role-based separation of duty constraints GJ Ahn, R Sandhu Proceedings of the fourth ACM workshop on Role-based access control, 43-54, 1999 | 190 | 1999 |
WLC05-3: Medium access control for multi-channel parallel transmission in cognitive radio networks T Shu, S Cui, M Krunz IEEE Globecom 2006, 1-5, 2006 | 188* | 2006 |
A role-based delegation framework for healthcare information systems L Zhang, GJ Ahn, BT Chu Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 184 | 2002 |
Securecloud: Towards a comprehensive security framework for cloud computing environments H Takabi, JBD Joshi, GJ Ahn 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 183 | 2010 |
Efficient provable data possession for hybrid clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 178 | 2010 |
Detecting and resolving firewall policy anomalies H Hu, GJ Ahn, K Kulkarni IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012 | 174 | 2012 |
Injecting RBAC to secure a web-based workflow system GJ Ahn, R Sandhu, M Kang, J Park Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000 | 160 | 2000 |
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks H Hu, GJ Ahn, J Jorgensen Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 136 | 2011 |