D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 58 Citations 13,571 305 World Ranking 2388 National Ranking 1288

Research.com Recognitions

Awards & Achievements

2015 - ACM Distinguished Member

2007 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer security

Gail-Joon Ahn mainly investigates Computer security, Access control, Cloud computing, Internet privacy and Role-based access control. His research integrates issues of Android and The Internet in his study of Computer security. His studies in Access control integrate themes in fields like Scheme, Revocation and Information sharing.

His studies deal with areas such as Data access, Data integrity and Network security as well as Cloud computing. His work deals with themes such as Identity management, Identity and Set, which intersect with Internet privacy. His study in Role-based access control is interdisciplinary in nature, drawing from both Workflow technology, Programming language, Semantics, Formal language and Workflow management system.

His most cited work include:

  • Security and Privacy Challenges in Cloud Computing Environments (1022 citations)
  • Role-based authorization constraints specification (388 citations)
  • Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage (344 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Access control, Role-based access control, World Wide Web and Internet privacy. His Computer security research is multidisciplinary, incorporating elements of Cloud computing, Cloud computing security and The Internet. His work in the fields of Access control, such as XACML, intersects with other areas such as Delegation.

His study explores the link between Role-based access control and topics such as Distributed computing that cross with problems in Service. His work carried out in the field of Internet privacy brings together such families of science as Identity management and Identity. Gail-Joon Ahn works mostly in the field of Security policy, limiting it down to topics relating to Computer security model and, in certain cases, Network security policy.

He most often published in these fields:

  • Computer security (54.26%)
  • Access control (35.65%)
  • Role-based access control (17.67%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (54.26%)
  • Access control (35.65%)
  • Android (4.10%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Access control, Android, Malware and World Wide Web. Gail-Joon Ahn has researched Computer security in several fields, including Ontology and Set. His research in Access control intersects with topics in Firewall and Authorization.

His Android study combines topics from a wide range of disciplines, such as Data mining, Deep learning, Convolutional neural network, Artificial intelligence and Static analysis. His Malware study incorporates themes from Artificial neural network, Java, Opcode and Honeypot. His work carried out in the field of World Wide Web brings together such families of science as Data access and Digital forensics.

Between 2016 and 2021, his most popular works were:

  • Deep Android Malware Detection (166 citations)
  • Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection (73 citations)
  • Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Gail-Joon Ahn mostly deals with Computer security, Distributed computing, Software-defined networking, Phishing and Android. His research in Computer security is mostly concerned with Evasion. His Distributed computing study integrates concerns from other disciplines, such as Real-time computing, Virtual firewall and Network administrator.

The various areas that Gail-Joon Ahn examines in his Software-defined networking study include Forwarding plane, Firewall, Network topology, Network security and Cloud computing. His Cloud computing study combines topics in areas such as Testbed, DMZ, Server and Security policy. His studies in Android integrate themes in fields like User interface, Encryption, Ransomware, Risk management and Risk assessment.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Security and Privacy Challenges in Cloud Computing Environments

H Takabi;J B D Joshi;G Ahn.
ieee symposium on security and privacy (2010)

1753 Citations

Role-based authorization constraints specification

Gail-Joon Ahn;Ravi Sandhu.
ACM Transactions on Information and System Security (2000)

649 Citations

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Mengyang Yu.
IEEE Transactions on Parallel and Distributed Systems (2012)

630 Citations

Access control in collaborative systems

William Tolone;Gail-Joon Ahn;Tanusree Pai;Seng-Phil Hong.
ACM Computing Surveys (2005)

489 Citations

A rule-based framework for role-based delegation and revocation

Longhua Zhang;Gail-Joon Ahn;Bei-Tseng Chu.
ACM Transactions on Information and System Security (2003)

473 Citations

User agent to exercise privacy control management in a user-centric identity management system

Gail-Joon Ahn.
(2009)

455 Citations

Role-based access control on the web

Joon S. Park;Ravi Sandhu;Gail-Joon Ahn.
ACM Transactions on Information and System Security (2001)

402 Citations

Dynamic Audit Services for Outsourced Storages in Clouds

Yan Zhu;Gail-Joon Ahn;Hongxin Hu;S. S. Yau.
IEEE Transactions on Services Computing (2013)

392 Citations

Dynamic audit services for integrity verification of outsourced storages in clouds

Yan Zhu;Huaixi Wang;Zexing Hu;Gail-Joon Ahn.
acm symposium on applied computing (2011)

354 Citations

Deep Android Malware Detection

Niall McLaughlin;Jesus Martinez del Rincon;BooJoong Kang;Suleiman Yerima.
conference on data and application security and privacy (2017)

348 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Gail-Joon Ahn

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 42

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 33

James Joshi

James Joshi

University of Pittsburgh

Publications: 30

Anna Cinzia Squicciarini

Anna Cinzia Squicciarini

Pennsylvania State University

Publications: 21

Joon S. Park

Joon S. Park

Syracuse University

Publications: 21

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 19

Dijiang Huang

Dijiang Huang

Arizona State University

Publications: 19

Xinwen Zhang

Xinwen Zhang

Samsung (South Korea)

Publications: 18

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 17

Hua Wang

Hua Wang

Victoria University

Publications: 16

Pierangela Samarati

Pierangela Samarati

University of Milan

Publications: 16

Arif Ghafoor

Arif Ghafoor

Purdue University West Lafayette

Publications: 15

Hui Li

Hui Li

Xidian University

Publications: 15

Vijayalakshmi Atluri

Vijayalakshmi Atluri

Rutgers, The State University of New Jersey

Publications: 15

Mauro Conti

Mauro Conti

University of Padua

Publications: 14

Rajkumar Buyya

Rajkumar Buyya

University of Melbourne

Publications: 14

Trending Scientists

Jon Peha

Jon Peha

Carnegie Mellon University

B. Espen Eckbo

B. Espen Eckbo

Dartmouth College

Yoshitaka Hamashima

Yoshitaka Hamashima

University of Shizuoka

Rodney J. McCabe

Rodney J. McCabe

Los Alamos National Laboratory

Adam P. Geballe

Adam P. Geballe

Fred Hutchinson Cancer Research Center

Marie-Pierre Doin

Marie-Pierre Doin

Grenoble Alpes University

Reimar Seltmann

Reimar Seltmann

Natural History Museum

David A. Jay

David A. Jay

Portland State University

Riccardo Vannucci

Riccardo Vannucci

University of Pavia

Michael H. Smith

Michael H. Smith

University of Georgia

Simon P. Kelly

Simon P. Kelly

University College Dublin

Patrick M. Dougherty

Patrick M. Dougherty

The University of Texas MD Anderson Cancer Center

Sylvain Laborde

Sylvain Laborde

German Sport University Cologne

Martha L. Thurlow

Martha L. Thurlow

University of Minnesota

Alberto Malliani

Alberto Malliani

University of Milan

Douglas A. Luke

Douglas A. Luke

Washington University in St. Louis

Something went wrong. Please try again later.