2010

Archived publications

2010

Risk-Aware Response for Mitigating MANET Routing Attacks (PDF) (BibTex)
Ziming Zhao, Hongxin Hu, Gail-J. Ahn and Ruoyu Wu
IEEE Global Communications Conference (GLOBECOM), Miami, FL, December 6-10, 2010

Security and Privacy Challenges in Cloud Computing Environments (PDF) (BibTex)
Hassan Takabi, James B. D. Joshi and Gail-J. Ahn
IEEE Security & Privacy Magazine, December 2010

Information Flow Control in Cloud Computing (PDF) (BibTex)
Ruoyu Wu, Gail-J. Ahn, Hongxin Hu and Mukesh Singhal
IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, IL, USA, October 9-12, 2010

A Collaborative Framework for Privacy Protection in Online Social Networks (PDF) (BibTex)
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu and Gail-J. Ahn
IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, IL, USA, October 9-12, 2010

FAME: A Firewall Anomaly Management Environment (PDF) (BibTex)
Hongxin Hu, Gail-J. Ahn and Ketan Kulkarni
ACM Workshop on Assurable & Usable Security Configuration (SafeConfig) in conjunction with 17th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, October 4, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems (PDF) (BibTex)
Wenjuan Xue, Gail-J. Ahn, Hongxin Hu, Xinwen Zhang and Jean-Pierre Seifert
European Symposium on Research in Computer Security (ESORICS), Athens, Greece, September 20-22, 2010

Representing and Reasoning about Web Access Control Policies (PDF) (BibTex)
Gail-J. Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng
IEEE International Computer Software and Applications Conference (COMPSAC), Seoul, Korea, July 19-23, 2010

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments (PDF) (BibTex)
Hassan Takabi, James Joshi and Gail-J. Ahn
IEEE International Workshop on Emerging Applications for Cloud Computing (CloudApp) in conjunction with the 34th Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seoul, Korea, July 19-23, 2010

Constructing Authorization Systems Using Assurance Management Framework (PDF) (BibTex)
Hongxin Hu and Gail-J. Ahn
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews (TSMC), June 2010

Why Johnny Can't Pentest: An Analysis of Black-box Web Vulnerability Scanners (PDF) (BibTex)
Adam Doupé, Marco Cova, and Giovanni Vigna
SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July, 2010

Reasoning about XACML Policy Descriptions in Answer Set Programming (PDF) (BibTex)
Gail-J. Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng
International Workshop on Nonmonotonic Reasoning (NMR), Toronto, Canada, May 14-16, 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy (PDF) (BibTex)
Yan Zhu, Gail-J. Ahn, Hongxin Hu and Huaixi Wang
ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, April 13-16, 2010

Archived Calendar Years

Archived calendar years