| Security and privacy challenges in cloud computing environments H Takabi, JBD Joshi, GJ Ahn IEEE Security & Privacy 8 (6), 24-31, 2010 | 2097 | 2010 |
| Cooperative provable data possession for integrity verification in multicloud storage Y Zhu, H Hu, GJ Ahn, M Yu IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012 | 683 | 2012 |
| Role-based authorization constraints specification GJ Ahn, R Sandhu ACM Transactions on Information and System Security (TISSEC) 3 (4), 207-226, 2000 | 676 | 2000 |
| Deep android malware detection N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ... Proceedings of the seventh ACM on conference on data and application …, 2017 | 667 | 2017 |
| Access control in collaborative systems W Tolone, GJ Ahn, T Pai, SP Hong ACM Computing Surveys (CSUR) 37 (1), 29-41, 2005 | 513 | 2005 |
| A rule-based framework for role-based delegation and revocation L Zhang, GJ Ahn, BT Chu ACM Transactions on Information and System Security (TISSEC) 6 (3), 404-441, 2003 | 478 | 2003 |
| Role-based access control on the web JS Park, R Sandhu, GJ Ahn ACM Transactions on Information and System Security (TISSEC) 4 (1), 37-71, 2001 | 434 | 2001 |
| Dynamic audit services for outsourced storages in clouds Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu IEEE transactions on services computing 6 (2), 227-238, 2011 | 419 | 2011 |
| Dynamic audit services for integrity verification of outsourced storages in clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011 | 394 | 2011 |
| FLOWGUARD: Building robust firewalls for software-defined networks H Hu, W Han, GJ Ahn, Z Zhao Proceedings of the third workshop on Hot topics in software defined …, 2014 | 380 | 2014 |
| User agent to exercise privacy control management in a user-centric identity management system GJ Ahn US Patent 9,338,188, 2016 | 318 | 2016 |
| Multiparty access control for online social networks: model and mechanisms H Hu, GJ Ahn, J Jorgensen IEEE transactions on knowledge and data engineering 25 (7), 1614-1627, 2012 | 308 | 2012 |
| Policy-driven security management for fog computing: Preliminary framework and a case study C Dsouza, GJ Ahn, M Taguinod Proceedings of the 2014 IEEE 15th international conference on information …, 2014 | 292 | 2014 |
| User agent to exercise privacy control management in a user-centric identity management system GJ Ahn US Patent 8,799,984, 2014 | 261 | 2014 |
| Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin K Liao, Z Zhao, A Doupé, GJ Ahn 2016 APWG symposium on electronic crime research (eCrime), 1-13, 2016 | 247 | 2016 |
| Detecting and resolving firewall policy anomalies H Hu, GJ Ahn, K Kulkarni IEEE Transactions on dependable and secure computing 9 (3), 318-331, 2012 | 246 | 2012 |
| Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 228 | 2020 |
| Securecloud: Towards a comprehensive security framework for cloud computing environments H Takabi, JBD Joshi, GJ Ahn 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 224 | 2010 |
| Matched and mismatched SOCs: A qualitative study on security operations center issues FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 201 | 2019 |
| The RSL99 language for role-based separation of duty constraints GJ Ahn, R Sandhu Proceedings of the fourth ACM workshop on Role-based access control, 43-54, 1999 | 201 | 1999 |