Search the dblp DataBase
Joon S. Park :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Joon S. Park , Ravi S. Sandhu Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:120-127 [Conf ] Joon S. Park , Gautam Jayaprakash , Joseph Giordano Component Integrity Check and Recovery Against Malicious Codes. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:466-470 [Conf ] Gaeil An , Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:182-195 [Conf ] Dongwan Shin , Gail-Joon Ahn , Joon S. Park An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:934-939 [Conf ] Joon S. Park , Gail-Joon Ahn , Ravi S. Sandhu Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:19-30 [Conf ] Joon S. Park , Abhishek Jain A Framework for Trusted Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:371-384 [Conf ] Joon S. Park , Harish S. Krishnan Trusted Identity and Session Management Using Secure Cookies. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:310-324 [Conf ] Joon S. Park , Ravi S. Sandhu , SreeLatha Ghanta RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:49-62 [Conf ] Joon S. Park , Pratheep Chandramohan Static vs. Dynamic Recovery Models for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Joon S. Park , Ganesh Devarajan Fine-Grained and Scalable Approaches for Message Integrity. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:280- [Conf ] Joon S. Park , Junseok Hwang A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:1047-1052 [Conf ] Michael Manley , Cheri McEntee , Anthony Molet , Joon S. Park Towards an Effective Wireless Security Policy for Sensitive Organizations. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:629-630 [Conf ] Joon S. Park , Joseph Giordano Access Control Requirements for Preventing Insider Threats. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:529-534 [Conf ] Gail-Joon Ahn , Ravi S. Sandhu , Myong H. Kang , Joon S. Park Injecting RBAC to secure a Web-based workflow system. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:1-10 [Conf ] Joon S. Park , Ravi S. Sandhu RBAC on the Web by Smart Certificates. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1999, pp:1-9 [Conf ] Ravi S. Sandhu , Joon S. Park Decentralized User-role Assignment for Web-based Intranets. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1998, pp:1-12 [Conf ] Joon S. Park , Keith P. Costello , Teresa M. Neven , Josh A. Diosomito A composite rbac approach for large, complex organizations. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:163-172 [Conf ] Joon S. Park , Junseok Hwang Role-based access control for collaborative enterprise in peer-to-peer computing environments. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:93-99 [Conf ] Myong H. Kang , Joon S. Park , Judith N. Froscher Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:66-74 [Conf ] Joon S. Park , Pratheep Chandramohan , Ganesh Devarajan , Joseph Giordano Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:127-142 [Conf ] Joon S. Park , Myong H. Kang , Judith N. Froscher A Secure Workflow System for Dynamic Collaboration. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:167-182 [Conf ] Joon S. Park , Derrick Dicoi WLAN Security: Current and Future. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2003, v:7, n:5, pp:60-65 [Journal ] Joon S. Park , Ravi S. Sandhu Secure Cookies on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:4, pp:36-44 [Journal ] Joon S. Park , Ravi S. Sandhu , Gail-Joon Ahn Role-based access control on the web. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:1, pp:37-71 [Journal ] Gaeil An , Joon S. Park Cooperative Component Testing Architecture in Collaborating Network Environment. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:179-190 [Conf ] Luk Boral , Maria Disla , Shivraj Patil , Jari Williams , Joon S. Park Countering Insider Threats in Personal Devices. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:365- [Conf ] Joon S. Park , Shuyuan Mary Ho Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:201-213 [Conf ] Joon S. Park , Pratheep Chandramohan , Joseph Giordano Component-abnormality detection and immunization for survivable systems in large distributed environments. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering and Applications, 2004, pp:102-108 [Conf ] Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications. [Citation Graph (, )][DBLP ] Towards trusted intelligence information sharing. [Citation Graph (, )][DBLP ] Role-based profile analysis for scalable and accurate insider-anomaly detection. [Citation Graph (, )][DBLP ] Problem Analyses and Recommendations in DRM Security Policies. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.303secs