Gail-Joon Ahn

Orcid: 0000-0002-4271-1666

According to our database1, Gail-Joon Ahn authored at least 243 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android.
Inf. Syst. Frontiers, April, 2023

Guaranteeing Anonymity in Attribute-Based Authorization.
CoRR, 2023

SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020

Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019

Towards a reliable firewall for software-defined networks.
Comput. Secur., 2019

Users Really Do Answer Telephone Scams.
Proceedings of the 28th USENIX Security Symposium, 2019

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

iCore: continuous and proactive extrospection on multi-core IoT devices.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Understanding and Predicting Private Interactions in Underground Forums.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

SDNSOC: Object Oriented SDN Framework.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Discretionary Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient Anonymous Message Submission.
IEEE Trans. Dependable Secur. Comput., 2018

Risk assessment of mobile applications based on machine learned malware dataset.
Multim. Tools Appl., 2018

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications.
IEEE Access, 2018

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Measuring E-mail header injections on the world wide web.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Challenges, Opportunities and a Framework for Web Environment Forensics.
Proceedings of the Advances in Digital Forensics XIV, 2018

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Challenges and Preparedness of SDN-based Firewalls.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

CacheLight: Defeating the CacheKit Attack.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
E-mail Header Injection Vulnerabilities.
it Inf. Technol., 2017

Toward Standardization of Authenticated Caller ID Transmission.
IEEE Commun. Stand. Mag., 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Science DMZ: SDN based secured cloud testbed.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

HoneyProxy: Design and implementation of next-generation honeynet via SDN.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
IEEE Secur. Priv., 2016

dbling: Identifying extensions installed on encrypted web thin clients.
Digit. Investig., 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games.
CoRR, 2016

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016

Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Towards Automated Threat Intelligence Fusion.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

HoneyMix: Toward SDN-based Intelligent Honeynet.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Checking Intent-based Communication in Android with Intent Space Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2015

Achieving Security Assurance with Assertion-based Application Construction.
EAI Endorsed Trans. Collab. Comput., 2015

Preface - WISA 2014.
Comput. Secur., 2015

Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Toward a Moving Target Defense for Web Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

ACTRA: A Case Study for Threat Information Sharing.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
Secure and efficient random functions with variable-length output.
J. Netw. Comput. Appl., 2014

FLOWGUARD: building robust firewalls for software-defined networks.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Game theoretic analysis of multiparty access control in online social networks.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards a Reliable SDN Firewall.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Policy-driven security management for fog computing: Preliminary framework and a case study.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

LPM: Layered Policy Management for Software-Defined Networks.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Discovering and analyzing deviant communities: Methods and experiments.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

RiskMon: continuous and automated risk assessment of mobile applications.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Morpheus: automatically generating heuristics to detect Android emulators.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Serv. Comput., 2013

Multiparty Access Control for Online Social Networks: Model and Mechanisms.
IEEE Trans. Knowl. Data Eng., 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013

Discovery and Resolution of Anomalies in Web Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2013

Visualization-based policy analysis for SELinux: framework and user study.
Int. J. Inf. Sec., 2013

Extensible policy framework for heterogeneous network environments.
Int. J. Inf. Comput. Secur., 2013

Collaboration in Multicloud Computing Environments: Framework and Security Issues.
Computer, 2013

On the Security of Picture Gesture Authentication.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Simulation-Based Validation for Smart Grid Environments: Framework and Experimental Results.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

Simulation-based validation for smart grid environments.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Supporting secure collaborations with attribute-based access control.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Towards comprehensive and collaborative forensics on email evidence.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Using instruction sequence abstraction for shellcode detection and attribution.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012

Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting and Resolving Firewall Policy Anomalies.
IEEE Trans. Dependable Secur. Comput., 2012

Enhancing directory virtualization to detect insider activity.
Secur. Commun. Networks, 2012

Efficient audit service outsourcing for data integrity in clouds.
J. Syst. Softw., 2012

Policy-driven role-based access management for ad-hoc collaboration.
J. Comput. Secur., 2012

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Inf. Softw. Technol., 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.
Int. J. Comput. Model. Algorithms Medicine, 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Access control for online social networks third party applications.
Comput. Secur., 2012

Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012

Model-Based Conformance Testing for Android.
Proceedings of the Advances in Information and Computer Security, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards HIPAA-compliant healthcare systems.
Proceedings of the ACM International Health Informatics Symposium, 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Enabling Collaborative data sharing in Google+.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics.
Proceedings of the Computer Security - ESORICS 2012, 2012

Secure sharing of electronic health records in clouds.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Security and Privacy in Social Networks.
IEEE Internet Comput., 2011

Assured resource sharing in Grid environments.
Int. J. Inf. Comput. Secur., 2011

Patient-centric authorization framework for electronic healthcare services.
Comput. Secur., 2011

Zero-knowledge proofs of retrievability.
Sci. China Inf. Sci., 2011

Automatic Extraction of Secrets from Malware.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Anomaly discovery and resolution in web access control policies.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards collaborative forensics: Preliminary framework.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Securing and utilizing social dynamics.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Ontology-Based Risk Evaluation in User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2011

Examining Social Dynamics for Countering Botnet Attacks.
Proceedings of the Global Communications Conference, 2011

Multiparty Authorization Framework for Data Sharing in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

MasterBlaster: Identifying Influential Players in Botnet Transactions.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Ontology-based policy anomaly management for autonomic computing.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Constructing Authorization Systems Using Assurance Management Framework.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Security and Privacy Challenges in Cloud Computing Environments.
IEEE Secur. Priv., 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptol. ePrint Arch., 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptol. ePrint Arch., 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptol. ePrint Arch., 2010

FAME: a firewall anomaly management environment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Representing and Reasoning about Web Access Control Policies.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Discretionary Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Security-Enhanced OSGi Service Environments.
IEEE Trans. Syst. Man Cybern. Part C, 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Privacy-Enhanced User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2009

Authorization Framework for Resource Sharing in Grid Environments.
Proceedings of the Grid and Distributed Computing, 2009

Towards System Integrity Protection with Graph-Based Policy Analysis.
Proceedings of the Data and Applications Security XXIII, 2009

A Framework for Enabling User-Controlled Persona in Online Social Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Analyzing and Managing Role-Based Access Control Policies.
IEEE Trans. Knowl. Data Eng., 2008

Access Control Management for SCADA Systems.
IEICE Trans. Inf. Syst., 2008

Portable User-Centric Identity Management.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Visualization based policy analysis: case study in SELinux.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Enabling verification and conformance testing for access control model.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Systematic Policy Analysis for High-Assurance Services in SELinux.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Towards Role-Based Authorization for OSGi Service Environments.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology.
Proceedings of the Conceptual Modeling, 2008

Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008

Enforcing Role-Based Access Control Policies in Web Services with UML and OCL.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur., 2007

Certification process artifacts defined as measurable units for software assurance.
Softw. Process. Improv. Pract., 2007

Towards secure information sharing using role-based delegation.
J. Netw. Comput. Appl., 2007

Towards realizing a formal RBAC model in real systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Effective Security Policy Management for Heterogeneous Network Environments.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

User-centric privacy management for federated identity management.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Managing heterogeneous network environments using an extensible policy framework.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Collegiate Cyber Game Design Criteria and Participation.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
Int. J. Softw. Eng. Knowl. Eng., 2006

Role-based access management for ad-hoc collaborative sharing.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Building problem domain ontology from security requirements in regulatory documents.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

Towards Secure Information Sharing and Management in Grid Environments.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Articulating and enforcing authorisation policies with UML and OCL.
ACM SIGSOFT Softw. Eng. Notes, 2005

Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Softw. Eng. Notes, 2005

Access control in collaborative systems.
ACM Comput. Surv., 2005

Role-based privilege and trust management.
Comput. Syst. Sci. Eng., 2005

Interactive exploration of large filesystems.
Proceedings of the Visualization and Data Analysis 2005, 2005

Formal specification of role-based security policies for clinical information systems.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Active Automation of the DITSCAP.
Proceedings of the Intelligence and Security Informatics, 2005

Specification and Validation of Authorisation Constraints Using UML and OCL.
Proceedings of the Computer Security, 2005

Managing privacy preferences for federated identity management.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Supporting access control policies across multiple operating systems.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
A role-based infrastructure management system: design and implementation.
Concurr. Pract. Exp., 2004

Information Assurance in Federated Identity Management: Experimentations and Issues.
Proceedings of the Web Information Systems, 2004

Role-Based Privilege Management Using Attribute Certificates and Delegation.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Group Hierarchies with Constrained User Assignment in Linux.
Proceedings of the Security In Information Systems, 2004

Defeating Internet Attacks Using Risk Awareness and Active Honeypots.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

Secure Information Sharing Using Role-based Delegation.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Ensuring information assurance in federated identity management.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Interactive Exploration of the AFS File System.
Proceedings of the 10th IEEE Symposium on Information Visualization (InfoVis 2004), 2004

Role-based Trust Assignment in Trust Management Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
A rule-based framework for role-based delegation and revocation.
ACM Trans. Inf. Syst. Secur., 2003

Specification and Classification of Role-based Authorization Policies.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Locale-based access control: placing collaborative authorization decisions in context.
Proceedings of the IEEE International Conference on Systems, 2003

Authorization management for role-based collaboration.
Proceedings of the IEEE International Conference on Systems, 2003

Constrained Role-based Delegation.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Dynamic and risk-aware network access management.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

On modeling system-centric information for role engineering.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

The role control center: features and case studies.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Role-Based Authorization in Decentralized Health Care Environments.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

2002
Reconstructing a formal security model.
Inf. Softw. Technol., 2002

Towards Scalable Authentication in Health Services.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

A role-based delegation framework for healthcare information systems.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Challenges to Multi-Enterprise Integration.
Proceedings of the Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2002

Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002

An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur., 2001

Decentralized user group assignment in Windows NT.
J. Syst. Softw., 2001

CONUGA: Constrained User-Group Assignment.
J. Netw. Comput. Appl., 2001

Role-Based Authorization Constraints Specification Using Object Constraint Language.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

A rule-based framework for role based delegation.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001

2000
Role-based authorization constraints specification.
ACM Trans. Inf. Syst. Secur., 2000

Role-based access control in DCOM.
J. Syst. Archit., 2000

UML-Based Representation of Role-Based Access Control.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Injecting RBAC to secure a Web-based workflow system.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

1999
Towards role-based administration in network information services.
J. Netw. Comput. Appl., 1999

The RSL99 Language for Role-Based Separation of Duty Constraints.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999


  Loading...