Gail-Joon Ahn is a professor of computer science and engineering in the School of Computing and Augmented Intelligence at Arizona State University. He has authored more than 200 refereed research papers. Prior to joining ASU, he was an associate professor of the College of Computing and Informatics and founding director of Center for Digital Identity and Cyber Defense Research at University of North Carolina at Charlotte.
His research foci include security analytics and big data driven security intelligence, vulnerability and risk management, access control and security architecture for distributed systems, identity and privacy management, cyber crime analysis, security-enhanced computing platforms, and formal models for computer security device. His research has been supported by National Science Foundation, National Security Agency, Department of Defense, Office of Naval Research, Department of Energy, Department of Justice, Allstate, Intel, Bank of America, CISCO, GoDaddy, Hewlett Packard, Google, Microsoft and Robert Wood Johnson Foundation.
He is currently the information director of ACM Special Interest Group on Security, Audit and Control (SIGSAC) and he is a recipient of U.S. Department of Energy Early Career Principal Investigator Award, Educator of the Year Award from Federal Information Systems Security Educators' Association (FISSEA) and Best Researcher Award from CIDSE. Also, he serves as associate editor-in-chief of IEEE Transactions on Dependable and Secure Computing, associate editor of ACM Transactions on Information and Systems Security and editorial board of Computers & Security. He is also the Steering Committee chair of ACM Symposium on Access Control Models and Technologies and the general chair of ACM Conference on Computer and Communications Security (CCS 2014).
His research foci include security analytics and big data driven security intelligence, vulnerability and risk management, access control and security architecture for distributed systems, identity and privacy management, cyber crime analysis, security-enhanced computing platforms, and formal models for computer security device. His research has been supported by National Science Foundation, National Security Agency, Department of Defense, Office of Naval Research, Department of Energy, Department of Justice, Allstate, Intel, Bank of America, CISCO, GoDaddy, Hewlett Packard, Google, Microsoft and Robert Wood Johnson Foundation.
Research/Areas of Expertise:
Security analytics and big data driven security intelligence Formal Models for Computer Security Network and Distributed Systems Security Vulnerability and Risk Assessment Cyber Crime Analysis
Publications
Selected publications:
Ziming Zhao, Gail-J. Ahn, and Hongxin Hu, Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation, ACM Transactions on Information and System Security, 2015.
Yiming Jing, Gail-J. Ahn, Ziming Zhao, and Hongxin Hu, Towards Automated Risk Assessment and Mitigation of Mobile Application, IEEE Transactions on Dependable and Secure Computing, 2014.
Mukesh Singhal, Santosh Chandrasekhar, Ge Tingjian, Ravi Sandhu, Ram Krishnan, Gail-J. Ahn and Elisa Bertino, Collaboration in Multi-Cloud Applications: Framework and Security Issues, IEEE Computer, February, 2013.
Hongxin Hu, Gail-J. Ahn and Jan Jorgense, Multiparty Access Control for On-line Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, July 2013.
Hongxin Hu, Gail-J. Ahn and Ketan Kulkarni, Discovery and Resolution of Anomalies in Web Access Control Policies, IEEE Transactions on Dependable and Secure Computing, 2013.
Mohamed Shehab, Anna Squicciarini, Gail-J. Ahn, Irini Kokkinou, Access Control for Online Social Networks Third Party Applications, Computers & Security, Elsevier, Vol. 31, No. 8, November 2012.
Gail-J. Ahn, Jing Jin and Mohamed Shehab, Policy-driven Role-based Access Management for Ad-hoc Collaboration, Journal of Computer Security, Vol. 20, 2012.
Hongxin Hu, Gail-J. Ahn and Ketan Kulkarni, Detecting and Resolving Firewall Policy Anomalies, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 3, 2012.
Ziming Zhao, Hongxin Hu, Gail-J. Ahn and Ruoyu Wuy, Risk-Aware Response for Mitigating MANET Routing Attacks, IEEE Transactions on Dependable and Secure Computing, Vo.9, No. 2, 2012.
Jing Jin, Gail-J. Ahn, Hongxin Hu, Michael Covington, and Xinwen Zhang, Patient-centric Authorization Framework for Electronic Health Records, Computers & Security, Vol. 30, No. 2-3, Elsevier Science, March-May 2011.
Hassan Takabi, James Joshi, and Gail-J. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security and Privacy, November/December 2010.
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, and Martin Gogolla. Analyzing and Managing Role-Based Access Control Policies. IEEE Transactions on Knowledge and Data Engineering (2008).
Gail-J. Ahn, Hongxin Hu and Jing Jin. Towards Role-based Authorization for OSGi Service Environments. Proc. of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2008) (2008).
Gail-J. Ahn, Moonam Ko and Mohamed Shehab. Portable User-Centric Identity Management. Proc. of 23rd IFIP International Information Security Conference (SEC 2008) (2008).
Gail-J. Ahn, Napoleon Paxton and Kevin Pearson. Understanding IRC Bot Behaviors in Network-centric Attack Detection and Prevention Framework. Proc. of 3rd International Conference on Information Warfare and Security (2008).
Gail-J. Ahn, Wenjuan Xu and Xinwen Zhang. Visualization Based Policy Analysis: Case Study in SELinux. Proc. of IEEE Workshop on Policies for Distributed Systems and Networks (POLICY’08) (2008).
Hongxin Hu and Gail-J. Ahn. Enabling veri?cation and conformance testing for access control model,. Proc. of 13th ACM Symposium on Access Control Models And Technologies (SACMAT) (2008).
Jing Jin, Gail-J. Ahn, Michael J. Covington, and Xinwen Zhang. Toward an Access Control Model for Sharing Composite Electronic Health Records. Proc. of the 4th International Conference on Collaborative Computing (2008).
Karsten Sohr, Tanveer Mustafa, Gail-J. Ahn and Xinyu Bao. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. Proc. of the 24th Annual Computer Security Applications Conference (ACSAC) (2008).
Mizuho Iwaihara, Kohei Murakami, Gail-J. Ahn and Masatoshi Yoshikawa. Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. Proc. of the 27th International Conference on Conceptual Modeling (ER 2008) (2008).
Mohamed Shehab, Anna Squicciarini and Gail-J. Ahn. Beyond User-to-User Access Control for Online Social Networks. Proc. of the10th International Conference on Information and Communications Security (ICICS 2008), LNCS 5309 (2008).
Wenjuan Xu, Mohamed Shehab and Gail-J. Ahn. Systematic Policy Analysis for High-assurance Services in SELinux. Proc. of 13th ACM Symposium on Access Control Models And Technologies (SACMAT) (2008).
B. Tolone, Gail-Joon Ahn, T. Pai and S. Hong, Access Control in Collaborative Systems, ACM Computing Surveys, Vol. 37, No. 1, ACM, March 2005.
Longhua Zhang, Gail-Joon Ahn and Bill Chu, A Rule-Based Framework for Role-Based Delegation and Revocation, ACM Transactions on Information and System Security, Vol.6, No.3, August 2003.
Gail-Joon Ahn, S. Hong and M. Shin, Reconstructing a Formal Security Model, Information and Software Technology, Vol. 44, No. 11, Elsevier Science, August 2002.
Joon Park, Gail-Joon Ahn and Ravi Sandhu, Secure Attribute Services on the Web, ACM Transactions on Information and System Security, Vol. 4, No. 1, February 2001.
Gail-Joon Ahn and Ravi Sandhu, Role-based Authorization Constraints Specification, ACM Transactions on Information and System Security, pages 207-226, Vol. 3, No. 4, ACM, November 2000.
Research Activity
Ahn,Gail-Joon*. III: Small: Collaborative Research: Privacy-Aware Collaborative Data Sharing in Human-Centered Social Networks. NSF-CISE(9/1/2015 - 8/31/2018).
Yau,Sik-Sang*, Ahn,Gail-Joon. DoD Information Assurance Security Program. NSA(8/1/2015 - 8/31/2016).
Candan,Kasim Selcuk*, Ahn,Gail-Joon, Davulcu,Hasan. Collaborative Research: Planning Grant: IUCRC for Assured and SCAlable Data Engineering (CASCADE). NSF-IIP(4/15/2015 - 3/31/2016).
Ahn,Gail-Joon*. A Study of Cyber Strategy Techniques with Data Diversity. ETRI(12/18/2014 - 12/17/2015).
Ahn,Gail-Joon*. Support for the Educational Activities at ACM CCS 2014. NSF-CISE(8/1/2014 - 7/31/2016).
Yau,Sik-Sang*, Ahn,Gail-Joon. DoD Information Assurance - Information Security Grant Program. NSA(8/1/2014 - 7/31/2015).
Ahn,Gail-Joon*. Development of Security Technology for Mobile System Software. Soongsil(8/1/2014 - 7/31/2020).
Yau,Sik-Sang*, Ahn,Gail-Joon. DOD Information Assurance - Information Security Grant Program. NSA(8/26/2013 - 7/31/2014).
Ahn,Gail-Joon*. Policy-aware Secure Collaboration in Fog Computing. CISCO SYSTEMS INC(7/2/2013 - 5/31/2015).
Yau,Sik-Sang*, Ahn,Gail-Joon. DoD Information Assurance - Information Security Grant Program. NSA(8/23/2012 - 8/22/2013).
Yau,Sik-Sang*, Yau,Sik-Sang*, Ahn,Gail-Joon, Huang,Dijiang. SFS: An Information and Systems Assurance Scholarship Program. NSF-EHR-DUE(9/15/2011 - 8/31/2016).
Yau,Sik-Sang*, Ahn,Gail-Joon, Huang,Dijiang. ASU Application for DoD Information Assurance Scholarship Program. DOD(9/24/2010 - 12/23/2011).
Ahn,Gail-Joon*. Assured Resource Sharing in Ad-hoc Collaboration. DOE-CHICAGO(6/1/2010 - 5/31/2015).
Ahn,Gail-Joon*. User-centric Identity Management on Mobile Devices. OIN(5/1/2010 - 8/31/2012).
Ahn,Gail-Joon*. TC: Small: Collaborative Proposal: User-Controlled Persona in Virtual Community. NSF-CISE(9/15/2009 - 8/31/2013).
Yau,Sik-Sang*, Ahn,Gail-Joon. DoD Information Assurance Scholarship (IASP) Program: Building Information Assurance Forces at Arizona State University. NSA(9/12/2009 - 12/11/2010).
Ahn,Gail-Joon*. Secure Information Sharing within a Collaboratory Environment. DOE-CHICAGO(2/1/2009 - 1/31/2010).
Ahn,Gail-Joon*. Examining the Creation, Distribution and Function of Malware on-Line. UNC Charlotte(1/1/2009 - 11/30/2009).