| 2008 |
| 33 | EE | Youngseek Kim,
Jessica Howard,
Sharad Ravindranath,
Joon S. Park:
Problem Analyses and Recommendations in DRM Security Policies.
EuroISI 2008: 165-178 |
| 2007 |
| 32 | EE | Gaeil An,
Joon S. Park:
Cooperative Component Testing Architecture in Collaborating Network Environment.
ATC 2007: 179-190 |
| 31 | EE | Joon S. Park,
Ganesh Devarajan:
Fine-Grained and Scalable Approaches for Message Integrity.
HICSS 2007: 280 |
| 30 | EE | Luk Boral,
Maria Disla,
Shivraj Patil,
Jari Williams,
Joon S. Park:
Countering Insider Threats in Personal Devices.
ISI 2007: 365 |
| 29 | EE | Joon S. Park,
Ganesh Devarajan:
Fine-Grained and Scalable Message Protection in Sensitive Organizations.
JSW 2(6): 64-75 (2007) |
| 2006 |
| 28 | EE | Joon S. Park,
Gautam Jayaprakash,
Joseph Giordano:
Component Integrity Check and Recovery Against Malicious Codes.
AINA (2) 2006: 466-470 |
| 27 | EE | Joon S. Park,
Joseph Giordano:
Role-based profile analysis for scalable and accurate insider-anomaly detection.
IPCCC 2006 |
| 26 | EE | Joon S. Park,
Joseph Giordano:
Access Control Requirements for Preventing Insider Threats.
ISI 2006: 529-534 |
| 25 | EE | Gaeil An,
Joon S. Park:
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.
Inscrypt 2006: 182-195 |
| 24 | EE | Joon S. Park,
Ashutosh Deshpande:
Spam Detection: Increasing Accuracy with A Hybrid Solution.
IS Management 23(1): 57-67 (2006) |
| 2005 |
| 23 | EE | Joon S. Park,
Harish S. Krishnan:
Trusted Identity and Session Management Using Secure Cookies.
DBSec 2005: 310-324 |
| 22 | EE | Michael Manley,
Cheri McEntee,
Anthony Molet,
Joon S. Park:
Towards an Effective Wireless Security Policy for Sensitive Organizations.
ISI 2005: 629-630 |
| 21 | | Joon S. Park,
Pratheep Chandramohan,
Ganesh Devarajan,
Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
SEC 2005: 127-142 |
| 20 | EE | Joon S. Park,
Tito Sierra:
Security Analyses for Enterprise Instant Messaging (EIM) Systems.
Information Systems Security 14(1): 26-39 (2005) |
| 2004 |
| 19 | | Joon S. Park,
Abhishek Jain:
A Framework for Trusted Wireless Sensor Networks.
DBSec 2004: 371-384 |
| 18 | EE | Joon S. Park,
Pratheep Chandramohan:
Static vs. Dynamic Recovery Models for Survivable Distributed Systems.
HICSS 2004 |
| 17 | | Joon S. Park,
Pratheep Chandramohan,
Joseph Giordano:
Component-abnormality detection and immunization for survivable systems in large distributed environments.
IASTED Conf. on Software Engineering and Applications 2004: 102-108 |
| 16 | | Joon S. Park,
Shuyuan Mary Ho:
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
ISI 2004: 201-213 |
| 15 | EE | Joon S. Park,
Keith P. Costello,
Teresa M. Neven,
Josh A. Diosomito:
A composite rbac approach for large, complex organizations.
SACMAT 2004: 163-172 |
| 2003 |
| 14 | EE | Joon S. Park,
Junseok Hwang:
A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services.
ISCC 2003: 1047-1052 |
| 13 | EE | Joon S. Park,
Junseok Hwang:
Role-based access control for collaborative enterprise in peer-to-peer computing environments.
SACMAT 2003: 93-99 |
| 12 | EE | Joon S. Park,
Derrick Dicoi:
WLAN Security: Current and Future.
IEEE Internet Computing 7(5): 60-65 (2003) |
| 2002 |
| 11 | EE | Dongwan Shin,
Gail-Joon Ahn,
Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
COMPSAC 2002: 934-939 |
| 2001 |
| 10 | | Joon S. Park,
Gail-Joon Ahn,
Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP.
DBSec 2001: 19-30 |
| 9 | EE | Myong H. Kang,
Joon S. Park,
Judith N. Froscher:
Access control mechanisms for inter-organizational workflow.
SACMAT 2001: 66-74 |
| 8 | | Joon S. Park,
Myong H. Kang,
Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration.
SEC 2001: 167-182 |
| 7 | EE | Joon S. Park,
Ravi S. Sandhu,
Gail-Joon Ahn:
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) |
| 2000 |
| 6 | EE | Gail-Joon Ahn,
Ravi S. Sandhu,
Myong H. Kang,
Joon S. Park:
Injecting RBAC to secure a Web-based workflow system.
ACM Workshop on Role-Based Access Control 2000: 1-10 |
| 5 | EE | Joon S. Park,
Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates.
ACSAC 2000: 120-127 |
| 4 | EE | Joon S. Park,
Ravi S. Sandhu:
Secure Cookies on the Web.
IEEE Internet Computing 4(4): 36-44 (2000) |
| 1999 |
| 3 | EE | Joon S. Park,
Ravi S. Sandhu:
RBAC on the Web by Smart Certificates.
ACM Workshop on Role-Based Access Control 1999: 1-9 |
| 2 | | Joon S. Park,
Ravi S. Sandhu,
SreeLatha Ghanta:
RBAC on the Web by Secure Cookies.
DBSec 1999: 49-62 |
| 1998 |
| 1 | EE | Ravi S. Sandhu,
Joon S. Park:
Decentralized User-role Assignment for Web-based Intranets.
ACM Workshop on Role-Based Access Control 1998: 1-12 |