dblp.uni-trier.dewww.uni-trier.de

Joon S. Park

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
33EEYoungseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park: Problem Analyses and Recommendations in DRM Security Policies. EuroISI 2008: 165-178
2007
32EEGaeil An, Joon S. Park: Cooperative Component Testing Architecture in Collaborating Network Environment. ATC 2007: 179-190
31EEJoon S. Park, Ganesh Devarajan: Fine-Grained and Scalable Approaches for Message Integrity. HICSS 2007: 280
30EELuk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park: Countering Insider Threats in Personal Devices. ISI 2007: 365
29EEJoon S. Park, Ganesh Devarajan: Fine-Grained and Scalable Message Protection in Sensitive Organizations. JSW 2(6): 64-75 (2007)
2006
28EEJoon S. Park, Gautam Jayaprakash, Joseph Giordano: Component Integrity Check and Recovery Against Malicious Codes. AINA (2) 2006: 466-470
27EEJoon S. Park, Joseph Giordano: Role-based profile analysis for scalable and accurate insider-anomaly detection. IPCCC 2006
26EEJoon S. Park, Joseph Giordano: Access Control Requirements for Preventing Insider Threats. ISI 2006: 529-534
25EEGaeil An, Joon S. Park: Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Inscrypt 2006: 182-195
24EEJoon S. Park, Ashutosh Deshpande: Spam Detection: Increasing Accuracy with A Hybrid Solution. IS Management 23(1): 57-67 (2006)
2005
23EEJoon S. Park, Harish S. Krishnan: Trusted Identity and Session Management Using Secure Cookies. DBSec 2005: 310-324
22EEMichael Manley, Cheri McEntee, Anthony Molet, Joon S. Park: Towards an Effective Wireless Security Policy for Sensitive Organizations. ISI 2005: 629-630
21 Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano: Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. SEC 2005: 127-142
20EEJoon S. Park, Tito Sierra: Security Analyses for Enterprise Instant Messaging (EIM) Systems. Information Systems Security 14(1): 26-39 (2005)
2004
19 Joon S. Park, Abhishek Jain: A Framework for Trusted Wireless Sensor Networks. DBSec 2004: 371-384
18EEJoon S. Park, Pratheep Chandramohan: Static vs. Dynamic Recovery Models for Survivable Distributed Systems. HICSS 2004
17 Joon S. Park, Pratheep Chandramohan, Joseph Giordano: Component-abnormality detection and immunization for survivable systems in large distributed environments. IASTED Conf. on Software Engineering and Applications 2004: 102-108
16 Joon S. Park, Shuyuan Mary Ho: Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. ISI 2004: 201-213
15EEJoon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito: A composite rbac approach for large, complex organizations. SACMAT 2004: 163-172
2003
14EEJoon S. Park, Junseok Hwang: A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services. ISCC 2003: 1047-1052
13EEJoon S. Park, Junseok Hwang: Role-based access control for collaborative enterprise in peer-to-peer computing environments. SACMAT 2003: 93-99
12EEJoon S. Park, Derrick Dicoi: WLAN Security: Current and Future. IEEE Internet Computing 7(5): 60-65 (2003)
2002
11EEDongwan Shin, Gail-Joon Ahn, Joon S. Park: An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939
2001
10 Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu: Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30
9EEMyong H. Kang, Joon S. Park, Judith N. Froscher: Access control mechanisms for inter-organizational workflow. SACMAT 2001: 66-74
8 Joon S. Park, Myong H. Kang, Judith N. Froscher: A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182
7EEJoon S. Park, Ravi S. Sandhu, Gail-Joon Ahn: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001)
2000
6EEGail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park: Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10
5EEJoon S. Park, Ravi S. Sandhu: Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127
4EEJoon S. Park, Ravi S. Sandhu: Secure Cookies on the Web. IEEE Internet Computing 4(4): 36-44 (2000)
1999
3EEJoon S. Park, Ravi S. Sandhu: RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9
2 Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta: RBAC on the Web by Secure Cookies. DBSec 1999: 49-62
1998
1EERavi S. Sandhu, Joon S. Park: Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12

Coauthor Index

1Gail-Joon Ahn [6] [7] [10] [11]
2Gaeil An [25] [32]
3Luk Boral [30]
4Pratheep Chandramohan [17] [18] [21]
5Keith P. Costello [15]
6Ashutosh Deshpande [24]
7Ganesh Devarajan [21] [29] [31]
8Derrick Dicoi [12]
9Josh A. Diosomito [15]
10Maria Disla [30]
11Judith N. Froscher [8] [9]
12SreeLatha Ghanta [2]
13Joseph Giordano [17] [21] [26] [27] [28]
14Shuyuan Mary Ho [16]
15Jessica Howard [33]
16Junseok Hwang [13] [14]
17Abhishek Jain [19]
18Gautam Jayaprakash [28]
19Myong H. Kang [6] [8] [9]
20Youngseek Kim [33]
21Harish S. Krishnan [23]
22Michael Manley [22]
23Cheri McEntee [22]
24Anthony Molet [22]
25Teresa M. Neven [15]
26Shivraj Patil [30]
27Sharad Ravindranath [33]
28Ravi S. Sandhu [1] [2] [3] [4] [5] [6] [7] [10]
29Dongwan Shin [11]
30Tito Sierra [20]
31Jari Williams [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)