The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joon S. Park: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joon S. Park, Ravi S. Sandhu
    Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:120-127 [Conf]
  2. Joon S. Park, Gautam Jayaprakash, Joseph Giordano
    Component Integrity Check and Recovery Against Malicious Codes. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:466-470 [Conf]
  3. Gaeil An, Joon S. Park
    Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:182-195 [Conf]
  4. Dongwan Shin, Gail-Joon Ahn, Joon S. Park
    An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:934-939 [Conf]
  5. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu
    Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:19-30 [Conf]
  6. Joon S. Park, Abhishek Jain
    A Framework for Trusted Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:371-384 [Conf]
  7. Joon S. Park, Harish S. Krishnan
    Trusted Identity and Session Management Using Secure Cookies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:310-324 [Conf]
  8. Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta
    RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:49-62 [Conf]
  9. Joon S. Park, Pratheep Chandramohan
    Static vs. Dynamic Recovery Models for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Joon S. Park, Ganesh Devarajan
    Fine-Grained and Scalable Approaches for Message Integrity. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:280- [Conf]
  11. Joon S. Park, Junseok Hwang
    A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1047-1052 [Conf]
  12. Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park
    Towards an Effective Wireless Security Policy for Sensitive Organizations. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:629-630 [Conf]
  13. Joon S. Park, Joseph Giordano
    Access Control Requirements for Preventing Insider Threats. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:529-534 [Conf]
  14. Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park
    Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf]
  15. Joon S. Park, Ravi S. Sandhu
    RBAC on the Web by Smart Certificates. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:1-9 [Conf]
  16. Ravi S. Sandhu, Joon S. Park
    Decentralized User-role Assignment for Web-based Intranets. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1998, pp:1-12 [Conf]
  17. Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito
    A composite rbac approach for large, complex organizations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:163-172 [Conf]
  18. Joon S. Park, Junseok Hwang
    Role-based access control for collaborative enterprise in peer-to-peer computing environments. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:93-99 [Conf]
  19. Myong H. Kang, Joon S. Park, Judith N. Froscher
    Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:66-74 [Conf]
  20. Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
    Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:127-142 [Conf]
  21. Joon S. Park, Myong H. Kang, Judith N. Froscher
    A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:167-182 [Conf]
  22. Joon S. Park, Derrick Dicoi
    WLAN Security: Current and Future. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:5, pp:60-65 [Journal]
  23. Joon S. Park, Ravi S. Sandhu
    Secure Cookies on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:4, pp:36-44 [Journal]
  24. Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn
    Role-based access control on the web. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:37-71 [Journal]
  25. Gaeil An, Joon S. Park
    Cooperative Component Testing Architecture in Collaborating Network Environment. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:179-190 [Conf]
  26. Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park
    Countering Insider Threats in Personal Devices. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:365- [Conf]
  27. Joon S. Park, Shuyuan Mary Ho
    Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:201-213 [Conf]
  28. Joon S. Park, Pratheep Chandramohan, Joseph Giordano
    Component-abnormality detection and immunization for survivable systems in large distributed environments. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:102-108 [Conf]

  29. Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications. [Citation Graph (, )][DBLP]


  30. Towards trusted intelligence information sharing. [Citation Graph (, )][DBLP]


  31. Role-based profile analysis for scalable and accurate insider-anomaly detection. [Citation Graph (, )][DBLP]


  32. Problem Analyses and Recommendations in DRM Security Policies. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002