2015 - ACM Distinguished Member
2007 - ACM Senior Member
Gail-Joon Ahn mainly investigates Computer security, Access control, Cloud computing, Internet privacy and Role-based access control. His research integrates issues of Android and The Internet in his study of Computer security. His studies in Access control integrate themes in fields like Scheme, Revocation and Information sharing.
His studies deal with areas such as Data access, Data integrity and Network security as well as Cloud computing. His work deals with themes such as Identity management, Identity and Set, which intersect with Internet privacy. His study in Role-based access control is interdisciplinary in nature, drawing from both Workflow technology, Programming language, Semantics, Formal language and Workflow management system.
The scientist’s investigation covers issues in Computer security, Access control, Role-based access control, World Wide Web and Internet privacy. His Computer security research is multidisciplinary, incorporating elements of Cloud computing, Cloud computing security and The Internet. His work in the fields of Access control, such as XACML, intersects with other areas such as Delegation.
His study explores the link between Role-based access control and topics such as Distributed computing that cross with problems in Service. His work carried out in the field of Internet privacy brings together such families of science as Identity management and Identity. Gail-Joon Ahn works mostly in the field of Security policy, limiting it down to topics relating to Computer security model and, in certain cases, Network security policy.
His primary areas of investigation include Computer security, Access control, Android, Malware and World Wide Web. Gail-Joon Ahn has researched Computer security in several fields, including Ontology and Set. His research in Access control intersects with topics in Firewall and Authorization.
His Android study combines topics from a wide range of disciplines, such as Data mining, Deep learning, Convolutional neural network, Artificial intelligence and Static analysis. His Malware study incorporates themes from Artificial neural network, Java, Opcode and Honeypot. His work carried out in the field of World Wide Web brings together such families of science as Data access and Digital forensics.
Gail-Joon Ahn mostly deals with Computer security, Distributed computing, Software-defined networking, Phishing and Android. His research in Computer security is mostly concerned with Evasion. His Distributed computing study integrates concerns from other disciplines, such as Real-time computing, Virtual firewall and Network administrator.
The various areas that Gail-Joon Ahn examines in his Software-defined networking study include Forwarding plane, Firewall, Network topology, Network security and Cloud computing. His Cloud computing study combines topics in areas such as Testbed, DMZ, Server and Security policy. His studies in Android integrate themes in fields like User interface, Encryption, Ransomware, Risk management and Risk assessment.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Security and Privacy Challenges in Cloud Computing Environments
H Takabi;J B D Joshi;G Ahn.
ieee symposium on security and privacy (2010)
Role-based authorization constraints specification
Gail-Joon Ahn;Ravi Sandhu.
ACM Transactions on Information and System Security (2000)
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Mengyang Yu.
IEEE Transactions on Parallel and Distributed Systems (2012)
Access control in collaborative systems
William Tolone;Gail-Joon Ahn;Tanusree Pai;Seng-Phil Hong.
ACM Computing Surveys (2005)
A rule-based framework for role-based delegation and revocation
Longhua Zhang;Gail-Joon Ahn;Bei-Tseng Chu.
ACM Transactions on Information and System Security (2003)
User agent to exercise privacy control management in a user-centric identity management system
Gail-Joon Ahn.
(2009)
Role-based access control on the web
Joon S. Park;Ravi Sandhu;Gail-Joon Ahn.
ACM Transactions on Information and System Security (2001)
Dynamic Audit Services for Outsourced Storages in Clouds
Yan Zhu;Gail-Joon Ahn;Hongxin Hu;S. S. Yau.
IEEE Transactions on Services Computing (2013)
Dynamic audit services for integrity verification of outsourced storages in clouds
Yan Zhu;Huaixi Wang;Zexing Hu;Gail-Joon Ahn.
acm symposium on applied computing (2011)
Deep Android Malware Detection
Niall McLaughlin;Jesus Martinez del Rincon;BooJoong Kang;Suleiman Yerima.
conference on data and application security and privacy (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University at Buffalo, State University of New York
The University of Texas at San Antonio
Samsung (South Korea)
Texas A&M University
Arizona State University
Arizona State University
Pennsylvania State University
University of Bremen
University of Pittsburgh
Arizona State University
Carnegie Mellon University
Dartmouth College
University of Shizuoka
Los Alamos National Laboratory
Fred Hutchinson Cancer Research Center
Grenoble Alpes University
Natural History Museum
Portland State University
University of Pavia
University of Georgia
University College Dublin
The University of Texas MD Anderson Cancer Center
German Sport University Cologne
University of Minnesota
University of Milan
Washington University in St. Louis