2008 |
33 | EE | Youngseek Kim,
Jessica Howard,
Sharad Ravindranath,
Joon S. Park:
Problem Analyses and Recommendations in DRM Security Policies.
EuroISI 2008: 165-178 |
2007 |
32 | EE | Gaeil An,
Joon S. Park:
Cooperative Component Testing Architecture in Collaborating Network Environment.
ATC 2007: 179-190 |
31 | EE | Joon S. Park,
Ganesh Devarajan:
Fine-Grained and Scalable Approaches for Message Integrity.
HICSS 2007: 280 |
30 | EE | Luk Boral,
Maria Disla,
Shivraj Patil,
Jari Williams,
Joon S. Park:
Countering Insider Threats in Personal Devices.
ISI 2007: 365 |
29 | EE | Joon S. Park,
Ganesh Devarajan:
Fine-Grained and Scalable Message Protection in Sensitive Organizations.
JSW 2(6): 64-75 (2007) |
2006 |
28 | EE | Joon S. Park,
Gautam Jayaprakash,
Joseph Giordano:
Component Integrity Check and Recovery Against Malicious Codes.
AINA (2) 2006: 466-470 |
27 | EE | Joon S. Park,
Joseph Giordano:
Role-based profile analysis for scalable and accurate insider-anomaly detection.
IPCCC 2006 |
26 | EE | Joon S. Park,
Joseph Giordano:
Access Control Requirements for Preventing Insider Threats.
ISI 2006: 529-534 |
25 | EE | Gaeil An,
Joon S. Park:
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.
Inscrypt 2006: 182-195 |
24 | EE | Joon S. Park,
Ashutosh Deshpande:
Spam Detection: Increasing Accuracy with A Hybrid Solution.
IS Management 23(1): 57-67 (2006) |
2005 |
23 | EE | Joon S. Park,
Harish S. Krishnan:
Trusted Identity and Session Management Using Secure Cookies.
DBSec 2005: 310-324 |
22 | EE | Michael Manley,
Cheri McEntee,
Anthony Molet,
Joon S. Park:
Towards an Effective Wireless Security Policy for Sensitive Organizations.
ISI 2005: 629-630 |
21 | | Joon S. Park,
Pratheep Chandramohan,
Ganesh Devarajan,
Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
SEC 2005: 127-142 |
20 | EE | Joon S. Park,
Tito Sierra:
Security Analyses for Enterprise Instant Messaging (EIM) Systems.
Information Systems Security 14(1): 26-39 (2005) |
2004 |
19 | | Joon S. Park,
Abhishek Jain:
A Framework for Trusted Wireless Sensor Networks.
DBSec 2004: 371-384 |
18 | EE | Joon S. Park,
Pratheep Chandramohan:
Static vs. Dynamic Recovery Models for Survivable Distributed Systems.
HICSS 2004 |
17 | | Joon S. Park,
Pratheep Chandramohan,
Joseph Giordano:
Component-abnormality detection and immunization for survivable systems in large distributed environments.
IASTED Conf. on Software Engineering and Applications 2004: 102-108 |
16 | | Joon S. Park,
Shuyuan Mary Ho:
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
ISI 2004: 201-213 |
15 | EE | Joon S. Park,
Keith P. Costello,
Teresa M. Neven,
Josh A. Diosomito:
A composite rbac approach for large, complex organizations.
SACMAT 2004: 163-172 |
2003 |
14 | EE | Joon S. Park,
Junseok Hwang:
A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services.
ISCC 2003: 1047-1052 |
13 | EE | Joon S. Park,
Junseok Hwang:
Role-based access control for collaborative enterprise in peer-to-peer computing environments.
SACMAT 2003: 93-99 |
12 | EE | Joon S. Park,
Derrick Dicoi:
WLAN Security: Current and Future.
IEEE Internet Computing 7(5): 60-65 (2003) |
2002 |
11 | EE | Dongwan Shin,
Gail-Joon Ahn,
Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
COMPSAC 2002: 934-939 |
2001 |
10 | | Joon S. Park,
Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP.
DBSec 2001: 19-30 |
9 | EE | Myong H. Kang,
Joon S. Park,
Judith N. Froscher:
Access control mechanisms for inter-organizational workflow.
SACMAT 2001: 66-74 |
8 | | Joon S. Park,
Myong H. Kang,
Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration.
SEC 2001: 167-182 |
7 | EE | Joon S. Park,
Ravi S. Sandhu,
Gail-Joon Ahn:
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) |
2000 |
6 | EE | Gail-Joon Ahn,
Ravi S. Sandhu,
Myong H. Kang,
Joon S. Park:
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control 2000: 1-10 |
5 | EE | Joon S. Park,
Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates.
ACSAC 2000: 120-127 |
4 | EE | Joon S. Park,
Ravi S. Sandhu:
Secure Cookies on the Web.
IEEE Internet Computing 4(4): 36-44 (2000) |
1999 |
3 | EE | Joon S. Park,
Ravi S. Sandhu:
RBAC on the Web by Smart Certificates.
ACM Workshop on Role-Based Access Control 1999: 1-9 |
2 | | Joon S. Park,
Ravi S. Sandhu,
SreeLatha Ghanta:
RBAC on the Web by Secure Cookies.
DBSec 1999: 49-62 |
1998 |
1 | EE | Ravi S. Sandhu,
Joon S. Park:
Decentralized User-role Assignment for Web-based Intranets.
ACM Workshop on Role-Based Access Control 1998: 1-12 |