Gail-Joon Ahn

According to our database1, Gail-Joon Ahn
  • authored at least 204 papers between 1999 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Information Forensics and Security, 2018

Efficient Anonymous Message Submission.
IEEE Trans. Dependable Sec. Comput., 2018

Risk assessment of mobile applications based on machine learned malware dataset.
Multimedia Tools Appl., 2018

Measuring E-mail header injections on the world wide web.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Challenges and Preparedness of SDN-based Firewalls.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
E-mail Header Injection Vulnerabilities.
it - Information Technology, 2017

Toward Standardization of Authenticated Caller ID Transmission.
IEEE Communications Standards Magazine, 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Science DMZ: SDN based secured cloud testbed.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

HoneyProxy: Design and implementation of next-generation honeynet via SDN.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
Journal of Computer Security, 2016

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
IEEE Security & Privacy, 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games.
CoRR, 2016

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016

Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Towards Automated Threat Intelligence Fusion.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

HoneyMix: Toward SDN-based Intelligent Honeynet.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Checking Intent-based Communication in Android with Intent Space Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications.
IEEE Trans. Dependable Sec. Comput., 2015

Achieving Security Assurance with Assertion-based Application Construction.
EAI Endorsed Trans. Collaborative Computing, 2015

Preface - WISA 2014.
Computers & Security, 2015

Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Toward a Moving Target Defense for Web Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

ACTRA: A Case Study for Threat Information Sharing.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
Secure and efficient random functions with variable-length output.
J. Network and Computer Applications, 2014

FLOWGUARD: building robust firewalls for software-defined networks.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Game theoretic analysis of multiparty access control in online social networks.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards a Reliable SDN Firewall.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Policy-driven security management for fog computing: Preliminary framework and a case study.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

LPM: Layered Policy Management for Software-Defined Networks.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Achieving security assurance with assertion-based application construction.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Discovering and analyzing deviant communities: Methods and experiments.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

RiskMon: continuous and automated risk assessment of mobile applications.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Morpheus: automatically generating heuristics to detect Android emulators.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Services Computing, 2013

Multiparty Access Control for Online Social Networks: Model and Mechanisms.
IEEE Trans. Knowl. Data Eng., 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Information Forensics and Security, 2013

Discovery and Resolution of Anomalies in Web Access Control Policies.
IEEE Trans. Dependable Sec. Comput., 2013

Visualization-based policy analysis for SELinux: framework and user study.
Int. J. Inf. Sec., 2013

Extensible policy framework for heterogeneous network environments.
IJICS, 2013

Collaboration in Multicloud Computing Environments: Framework and Security Issues.
IEEE Computer, 2013

On the Security of Picture Gesture Authentication.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

Simulation-based validation for smart grid environments.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Supporting secure collaborations with attribute-based access control.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Towards comprehensive and collaborative forensics on email evidence.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Using instruction sequence abstraction for shellcode detection and attribution.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2012

Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Sec. Comput., 2012

Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Sec. Comput., 2012

Detecting and Resolving Firewall Policy Anomalies.
IEEE Trans. Dependable Sec. Comput., 2012

Enhancing directory virtualization to detect insider activity.
Security and Communication Networks, 2012

Efficient audit service outsourcing for data integrity in clouds.
Journal of Systems and Software, 2012

Policy-driven role-based access management for ad-hoc collaboration.
Journal of Computer Security, 2012

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Information & Software Technology, 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.
IJCMAM, 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Access control for online social networks third party applications.
Computers & Security, 2012

Efficient construction of provably secure steganography under ordinary covert channels.
SCIENCE CHINA Information Sciences, 2012

Model-Based Conformance Testing for Android.
Proceedings of the Advances in Information and Computer Security, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards HIPAA-compliant healthcare systems.
Proceedings of the ACM International Health Informatics Symposium, 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Enabling Collaborative data sharing in Google+.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics.
Proceedings of the Computer Security - ESORICS 2012, 2012

Secure sharing of electronic health records in clouds.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Security and Privacy in Social Networks.
IEEE Internet Computing, 2011

Assured resource sharing in Grid environments.
IJICS, 2011

Patient-centric authorization framework for electronic healthcare services.
Computers & Security, 2011

Zero-knowledge proofs of retrievability.
SCIENCE CHINA Information Sciences, 2011

Automatic Extraction of Secrets from Malware.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Anomaly discovery and resolution in web access control policies.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards collaborative forensics: Preliminary framework.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Securing and utilizing social dynamics.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Ontology-Based Risk Evaluation in User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2011

Examining Social Dynamics for Countering Botnet Attacks.
Proceedings of the Global Communications Conference, 2011

Multiparty Authorization Framework for Data Sharing in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

MasterBlaster: Identifying Influential Players in Botnet Transactions.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Ontology-based policy anomaly management for autonomic computing.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Constructing Authorization Systems Using Assurance Management Framework.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Security and Privacy Challenges in Cloud Computing Environments.
IEEE Security & Privacy, 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptology ePrint Archive, 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptology ePrint Archive, 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptology ePrint Archive, 2010

FAME: a firewall anomaly management environment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Representing and Reasoning about Web Access Control Policies.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A collaborative framework for privacy protection in online social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Efficient provable data possession for hybrid clouds.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cryptographic role-based security mechanisms based on role-key hierarchy.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Discretionary Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Security-Enhanced OSGi Service Environments.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Privacy-Enhanced User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2009

Towards System Integrity Protection with Graph-Based Policy Analysis.
Proceedings of the Data and Applications Security XXIII, 2009

A Framework for Enabling User-Controlled Persona in Online Social Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Analyzing and Managing Role-Based Access Control Policies.
IEEE Trans. Knowl. Data Eng., 2008

Access Control Management for SCADA Systems.
IEICE Transactions, 2008

Portable User-Centric Identity Management.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Visualization based policy analysis: case study in SELinux.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Enabling verification and conformance testing for access control model.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Systematic Policy Analysis for High-Assurance Services in SELinux.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Towards Role-Based Authorization for OSGi Service Environments.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology.
Proceedings of the Conceptual Modeling, 2008

Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008

Enforcing Role-Based Access Control Policies in Web Services with UML and OCL.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur., 2007

Certification process artifacts defined as measurable units for software assurance.
Software Process: Improvement and Practice, 2007

Towards secure information sharing using role-based delegation.
J. Network and Computer Applications, 2007

Towards realizing a formal RBAC model in real systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Effective Security Policy Management for Heterogeneous Network Environments.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

User-centric privacy management for federated identity management.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Managing heterogeneous network environments using an extensible policy framework.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Collegiate Cyber Game Design Criteria and Participation.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
International Journal of Software Engineering and Knowledge Engineering, 2006

Role-based access management for ad-hoc collaborative sharing.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Building problem domain ontology from security requirements in regulatory documents.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

Towards Secure Information Sharing and Management in Grid Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Articulating and enforcing authorisation policies with UML and OCL.
ACM SIGSOFT Software Engineering Notes, 2005

Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Software Engineering Notes, 2005

Access control in collaborative systems.
ACM Comput. Surv., 2005

Role-based privilege and trust management.
Comput. Syst. Sci. Eng., 2005

Interactive exploration of large filesystems.
Proceedings of the Visualization and Data Analysis 2005, 2005

Formal specification of role-based security policies for clinical information systems.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Active Automation of the DITSCAP.
Proceedings of the Intelligence and Security Informatics, 2005

Articulating and enforcing authorisation policies with UML and OCL.
Proceedings of the 2005 Workshop on Software Engineering for Secure Systems, 2005

Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
Proceedings of the 2005 Workshop on Software Engineering for Secure Systems, 2005

Specification and Validation of Authorisation Constraints Using UML and OCL.
Proceedings of the Computer Security, 2005

Managing privacy preferences for federated identity management.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Supporting access control policies across multiple operating systems.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
A role-based infrastructure management system: design and implementation.
Concurrency - Practice and Experience, 2004

Information Assurance in Federated Identity Management: Experimentations and Issues.
Proceedings of the Web Information Systems, 2004

Role-Based Privilege Management Using Attribute Certificates and Delegation.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Group Hierarchies with Constrained User Assignment in Linux.
Proceedings of the Security In Information Systems, 2004

Defeating Internet Attacks Using Risk Awareness and Active Honeypots.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

Secure Information Sharing Using Role-based Delegation.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Ensuring information assurance in federated identity management.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Interactive Exploration of the AFS File System.
Proceedings of the 10th IEEE Symposium on Information Visualization (InfoVis 2004), 2004

Role-based Trust Assignment in Trust Management Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
A rule-based framework for role-based delegation and revocation.
ACM Trans. Inf. Syst. Secur., 2003

Specification and Classification of Role-based Authorization Policies.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Locale-based access control: placing collaborative authorization decisions in context.
Proceedings of the IEEE International Conference on Systems, 2003

Authorization management for role-based collaboration.
Proceedings of the IEEE International Conference on Systems, 2003

Constrained Role-based Delegation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Dynamic and risk-aware network access management.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

On modeling system-centric information for role engineering.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

The role control center: features and case studies.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Role-Based Authorization in Decentralized Health Care Environments.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

2002
Reconstructing a formal security model.
Information & Software Technology, 2002

Towards Scalable Authentication in Health Services.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

A role-based delegation framework for healthcare information systems.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Challenges to Multi-Enterprise Integration.
Proceedings of the Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2002

Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002

An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur., 2001

Decentralized user group assignment in Windows NT.
Journal of Systems and Software, 2001

CONUGA: Constrained User-Group Assignment.
J. Network and Computer Applications, 2001

Role-Based Authorization Constraints Specification Using Object Constraint Language.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

A rule-based framework for role based delegation.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001

2000
Role-based authorization constraints specification.
ACM Trans. Inf. Syst. Secur., 2000

Role-based access control in DCOM.
Journal of Systems Architecture, 2000

UML-Based Representation of Role-Based Access Control.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Injecting RBAC to secure a Web-based workflow system.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

1999
Towards role-based administration in network information services.
J. Network and Computer Applications, 1999

The RSL99 Language for Role-Based Separation of Duty Constraints.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999


  Loading...