Security and privacy challenges in cloud computing environments H Takabi, JBD Joshi, GJ Ahn IEEE Security & Privacy 8 (6), 24-31, 2010 | 2014 | 2010 |
Cooperative provable data possession for integrity verification in multicloud storage Y Zhu, H Hu, GJ Ahn, M Yu IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012 | 702 | 2012 |
Role-based authorization constraints specification GJ Ahn, R Sandhu ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000 | 663 | 2000 |
Deep android malware detection N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ... Proceedings of the seventh ACM on conference on data and application …, 2017 | 593 | 2017 |
Access control in collaborative systems W Tolone, GJ Ahn, T Pai, SP Hong ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005 | 513 | 2005 |
A rule-based framework for role-based delegation and revocation L Zhang, GJ Ahn, BT Chu ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003 | 480 | 2003 |
Dynamic audit services for outsourced storages in clouds Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu IEEE transactions on services computing 6 (2), 227-238, 2011 | 419 | 2011 |
Role-based access control on the web JS Park, R Sandhu, GJ Ahn ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001 | 414 | 2001 |
Dynamic audit services for integrity verification of outsourced storages in clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011 | 394 | 2011 |
FLOWGUARD: Building robust firewalls for software-defined networks H Hu, W Han, GJ Ahn, Z Zhao Proceedings of the third workshop on Hot topics in software defined …, 2014 | 376 | 2014 |
User agent to exercise privacy control management in a user-centric identity management system GJ Ahn US Patent 9,338,188, 2016 | 297 | 2016 |
Multiparty access control for online social networks: model and mechanisms H Hu, GJ Ahn, J Jorgensen IEEE transactions on knowledge and data engineering 25 (7), 1614-1627, 2012 | 297 | 2012 |
Policy-driven security management for fog computing: Preliminary framework and a case study C Dsouza, GJ Ahn, M Taguinod Proceedings of the 2014 IEEE 15th international conference on information …, 2014 | 292 | 2014 |
Detecting and resolving firewall policy anomalies H Hu, GJ Ahn, K Kulkarni IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012 | 242 | 2012 |
User agent to exercise privacy control management in a user-centric identity management system GJ Ahn US Patent 8,799,984, 2014 | 223 | 2014 |
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin K Liao, Z Zhao, A Doupé, GJ Ahn 2016 APWG symposium on electronic crime research (eCrime), 1-13, 2016 | 222 | 2016 |
Securecloud: Towards a comprehensive security framework for cloud computing environments H Takabi, JBD Joshi, GJ Ahn 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 217 | 2010 |
Efficient provable data possession for hybrid clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 207 | 2010 |
A role-based delegation framework for healthcare information systems L Zhang, GJ Ahn, BT Chu Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 195 | 2002 |
The RSL99 language for role-based separation of duty constraints GJ Ahn, R Sandhu Proceedings of the fourth ACM workshop on Role-based access control, 43-54, 1999 | 195 | 1999 |