Search For:

Displaying 1-21 out of 21 total
Dynamic Audit Services for Outsourced Storages in Clouds
Found in: IEEE Transactions on Services Computing
By Yan Zhu, Gail-Joon Ahn, Hongxin Hu,S. S. Yau,H. G. An, Chang-Jun Hu
Issue Date:April 2013
pp. 227-238
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable u...
 
Discovery and Resolution of Anomalies in Web Access Control Policies
Found in: IEEE Transactions on Dependable and Secure Computing
By Hongxin Hu, Gail-Joon Ahn,Ketan Kulkarni
Issue Date:November 2013
pp. 341-354
Emerging computing technologies such as web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorize...
 
Multiparty Access Control for Online Social Networks: Model and Mechanisms
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hongxin Hu,Gail-Joon Ahn,Jan Jorgensen
Issue Date:July 2013
pp. 1614-1627
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions and information sharing, but also ra...
 
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yan Zhu,Hongxin Hu,Gail-Joon Ahn,Mengyang Yu
Issue Date:December 2012
pp. 2231-2244
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migr...
 
Detecting and Resolving Firewall Policy Anomalies
Found in: IEEE Transactions on Dependable and Secure Computing
By Hongxin Hu,Gail-Joon Ahn,Ketan Kulkarni
Issue Date:May 2012
pp. 318-331
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized...
 
Remote Attestation with Domain-Based Integrity Model and Policy Analysis
Found in: IEEE Transactions on Dependable and Secure Computing
By Wenjuan Xu,Xinwen Zhang,Hongxin Hu,Gail-Joon Ahn,Jean-Pierre Seifert
Issue Date:May 2012
pp. 429-442
We propose and implement an innovative remote attestation framework called DR@FT for efficiently measuring a target system based on an information flow-based integrity model. With this model, the high integrity processes of a system are first measured and ...
 
Automatic Extraction of Secrets from Malware
Found in: Reverse Engineering, Working Conference on
By Ziming Zhao,Gail-Joon Ahn,Hongxin Hu
Issue Date:October 2011
pp. 159-168
As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal cipher text data in malware is now crit...
 
Risk-Aware Mitigation for MANET Routing Attacks
Found in: IEEE Transactions on Dependable and Secure Computing
By Ziming Zhao,Hongxin Hu,Gail-Joon Ahn,Ruoyu Wu
Issue Date:March 2012
pp. 250-260
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MAN...
 
Representing and Reasoning about Web Access Control Policies
Found in: Computer Software and Applications Conference, Annual International
By Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng
Issue Date:July 2010
pp. 137-146
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unautho...
 
Towards Role-Based Authorization for OSGi Service Environments
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Gail-Joon Ahn, Hongxin Hu, Jing Jin
Issue Date:October 2008
pp. 23-29
OSGi framework enables diverse devices to conveniently establish a local area network environment such as homes, offices, and automobiles. Access control is one of the crucial parts which should be considered in such emerging environments. However, the cur...
 
Towards Automated Risk Assessment and Mitigation of Mobile Application
Found in: IEEE Transactions on Dependable and Secure Computing
By Yiming Jing,Gail-Joon Ahn,Ziming Zhao,Hongxin Hu
Issue Date:February 2015
pp. 1
Mobile operating systems, such as Apple’s iOS and Google’s Android, have supported a ballooning market of featurerich mobile applications. However, helping users understand and mitigate security risks of mobile applications is still an ongoing challenge. W...
 
Towards trust-aware access management for ad-hoc collaborations
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu
Issue Date:November 2007
pp. 41-48
In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ properties/attributes rather than their identities. While the user’s attributes are...
 
Dynamic audit services for integrity verification of outsourced storages in clouds
Found in: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC '11)
By Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Stephen S. Yau, Yan Zhu, Zexing Hu
Issue Date:March 2011
pp. 1550-1557
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling and index-hash table, supporting provable up...
     
Efficient provable data possession for hybrid clouds
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Stephen S. Yau, Yan Zhu, Zexing Hu
Issue Date:October 2010
pp. 756-758
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme in hybrid clouds to support scalability of service and data migration, in whi...
     
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
Found in: Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11)
By Gail-Joon Ahn, Hongxin Hu, Jan Jorgensen
Issue Date:December 2011
pp. 103-112
We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and information sharing, but also raise a number of security and privacy issues. Although OSNs allow...
     
Anomaly discovery and resolution in web access control policies
Found in: Proceedings of the 16th ACM symposium on Access control models and technologies (SACMAT '11)
By Gail-Joon Ahn, Hongxin Hu, Ketan Kulkarni
Issue Date:June 2011
pp. 165-174
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unautho...
     
FAME: a firewall anomaly management environment
Found in: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration (SafeConfig '10)
By Gail-Joon Ahn, Hongxin Hu, Ketan Kulkarni
Issue Date:October 2010
pp. 17-26
Firewalls are a widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the fir...
     
Cryptographic role-based security mechanisms based on role-key hierarchy
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Yan Zhu
Issue Date:April 2010
pp. 314-319
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, c...
     
Patient-centric authorization framework for sharing electronic health records
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Gail-Joon Ahn, Hongxin Hu, Jing Jin, Michael J. Covington, Xinwen Zhang
Issue Date:June 2009
pp. 1-22
In modern healthcare environments, a fundamental requirement for achieving continuity of care is the seamless access to distributed patient health records in an integrated and unified manner, directly at the point of care. However, Electronic Health Record...
     
Enabling verification and conformance testing for access control model
Found in: Proceedings of the 13th ACM symposium on Access control models and technologies (SACMAT '08)
By GailJoon Ahn, Hongxin Hu
Issue Date:June 2008
pp. 1-1
Verification and testing are the important step for software assurance. However, such crucial and yet challenging tasks have not been widely adopted in building access control systems. In this paper we propose a methodology to support automatic analysis an...
     
Towards realizing a formal RBAC model in real systems
Found in: Proceedings of the 12th ACM symposium on Access control models and technologies (SACMAT '07)
By Gail-Joon Ahn, Hongxin Hu
Issue Date:June 2007
pp. 215-224
There still exists an open question on how formal models can be fully realized in the system development phase. The Model Driven Development (MDD) approach has been recently introduced to deal with such a critical issue for building high assurance software...
     
 1