scispace - formally typeset
G

Gail-Joon Ahn

Researcher at Arizona State University

Publications -  278
Citations -  11624

Gail-Joon Ahn is an academic researcher from Arizona State University. The author has contributed to research in topics: Access control & Role-based access control. The author has an hindex of 52, co-authored 271 publications receiving 10442 citations. Previous affiliations of Gail-Joon Ahn include University of North Carolina at Chapel Hill & Arizona's Public Universities.

Papers
More filters
Journal ArticleDOI

Security and Privacy Challenges in Cloud Computing Environments

TL;DR: This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Journal ArticleDOI

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

TL;DR: This paper addresses the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which it considers the existence of multiple cloud service providers to cooperatively store and maintain the clients' data.
Journal ArticleDOI

Role-based authorization constraints specification

TL;DR: An intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics is introduced and it is shown that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance.
Proceedings ArticleDOI

Deep Android Malware Detection

TL;DR: A novel android malware detection system that uses a deep convolutional neural network (CNN) to perform static analysis of the raw opcode sequence from a disassembled program, removing the need for hand-engineered malware features.
Journal ArticleDOI

Access control in collaborative systems

TL;DR: The article examines existing access control models as applied to collaboration, highlighting not only the benefits, but also the weaknesses of these models.