G
Gail-Joon Ahn
Researcher at Arizona State University
Publications - 278
Citations - 11624
Gail-Joon Ahn is an academic researcher from Arizona State University. The author has contributed to research in topics: Access control & Role-based access control. The author has an hindex of 52, co-authored 271 publications receiving 10442 citations. Previous affiliations of Gail-Joon Ahn include University of North Carolina at Chapel Hill & Arizona's Public Universities.
Papers
More filters
Journal ArticleDOI
Security and Privacy Challenges in Cloud Computing Environments
TL;DR: This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Journal ArticleDOI
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
TL;DR: This paper addresses the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which it considers the existence of multiple cloud service providers to cooperatively store and maintain the clients' data.
Journal ArticleDOI
Role-based authorization constraints specification
Gail-Joon Ahn,Ravi Sandhu +1 more
TL;DR: An intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics is introduced and it is shown that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance.
Proceedings ArticleDOI
Deep Android Malware Detection
Niall McLaughlin,Jesus Martinez del Rincon,BooJoong Kang,Suleiman Y. Yerima,Paul Miller,Sakir Sezer,Yeganeh Safaei,Erik Trickel,Ziming Zhao,Adam Doupé,Gail-Joon Ahn +10 more
TL;DR: A novel android malware detection system that uses a deep convolutional neural network (CNN) to perform static analysis of the raw opcode sequence from a disassembled program, removing the need for hand-engineered malware features.
Journal ArticleDOI
Access control in collaborative systems
TL;DR: The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.