default search action
Joon S. Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Faisal Haque Bappy, Kamrul Hasan, Joon S. Park, Carlos E. Caicedo Bastidas, Tariqul Islam:
Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks. CoRR abs/2407.20980 (2024) - 2023
- [c43]Faisal Haque Bappy, Saklain Zaman, Tariqul Islam, Redwan Ahmed Rizvee, Joon S. Park, Kamrul Hasan:
Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control. GLOBECOM 2023: 6801-6806 - [i1]Faisal Haque Bappy, Saklain Zaman, Tariqul Islam, Redwan Ahmed Rizvee, Joon S. Park, Kamrul Hasan:
Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control. CoRR abs/2308.04453 (2023) - 2022
- [c42]Tariqul Islam, Kamrul Hasan, Saheb Singh, Joon S. Park:
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing. CSCloud/EdgeCom 2022: 74-79 - 2021
- [c41]Tina Alsadhan, Joon S. Park:
Leveraging Information Security Continuous Monitoring to Enhance Cybersecurity. CSCI 2021: 753-759
2010 – 2019
- 2019
- [j15]Natã Miccael Barbosa, Joon S. Park, Yaxing Yao, Yang Wang:
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. Proc. Priv. Enhancing Technol. 2019(4): 211-231 (2019) - 2016
- [j14]Sergiu Conovalu, Joon S. Park:
Cybersecurity Strategies for Smart Grids. J. Comput. 11(4): 300-309 (2016) - [c40]Ashay S. Jawale, Joon S. Park:
A Security Analysis on Apple Pay. EISIC 2016: 160-163 - [c39]Tina Alsadhan, Joon S. Park:
Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation. EISIC 2016: 164-167 - [c38]Tina Alsadhan, Joon S. Park:
Security Automation for Information Security Continuous Monitoring: Research Framework. SERVICES 2016: 130-131 - 2014
- [j13]Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. Comput. Secur. 42: 116-136 (2014) - [j12]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Social network attack simulation with honeytokens. Soc. Netw. Anal. Min. 4(1): 221 (2014) - [c37]Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodríguez:
Game Theoretic Modeling of Security and Interdependency in a Public Cloud. IEEE CLOUD 2014: 514-521 - [c36]Nihar Vuppalapati, Joon S. Park:
Online Behavioral Advertising (OBA) with privacy protection. WorldCIS 2014: 60-65 - 2013
- [j11]Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph Giordano, Kevin A. Kwiat:
Component survivability at runtime for mission-critical distributed systems. J. Supercomput. 66(3): 1390-1417 (2013) - [c35]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Game theoretic attack analysis in online social network (OSN) services. ASONAM 2013: 1012-1019 - 2012
- [j10]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
Surviving in Cyberspace: A Game Theoretic Approach. J. Commun. 7(6): 436-450 (2012) - [c34]Joon S. Park, Edward Spetka, Hassan Rasheed, E. Paul Ratazzi, Keesook J. Han:
Near-Real-Time Cloud Auditing for Rapid Response. AINA Workshops 2012: 1252-1257 - [c33]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
A game theoretic approach for modeling optimal data sharing on Online Social Networks. CCE 2012: 1-6 - [c32]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. TrustCom 2012: 648-655 - [c31]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Towards trusted data management in online social network (OSN) services. WorldCIS 2012: 202-203 - 2011
- [j9]Joon S. Park, Gaeil An, Ivy Y. Liu:
Active access control (AAC) with fine-granularity and scalability. Secur. Commun. Networks 4(10): 1114-1129 (2011)
2000 – 2009
- 2009
- [c30]Joon S. Park, Jaeho Yim, Jason Hallahan:
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications. ICEIS (3) 2009: 393-398 - [c29]Joseph V. Treglia, Joon S. Park:
Towards trusted intelligence information sharing. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 45-52 - 2008
- [c28]Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park:
Problem Analyses and Recommendations in DRM Security Policies. EuroISI 2008: 165-178 - 2007
- [j8]Joon S. Park, Gaeil An, Deepak Chandra:
Trusted P2P computing environments with role-based access control. IET Inf. Secur. 1(1): 27-35 (2007) - [j7]Joon S. Park, Ganesh Devarajan:
Fine-Grained and Scalable Message Protection in Sensitive Organizations. J. Softw. 2(6): 64-75 (2007) - [c27]Gaeil An, Joon S. Park:
Cooperative Component Testing Architecture in Collaborating Network Environment. ATC 2007: 179-190 - [c26]Joon S. Park, Ganesh Devarajan:
Fine-Grained and Scalable Approaches for Message Integrity. HICSS 2007: 280 - [c25]Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park:
Countering Insider Threats in Personal Devices. ISI 2007: 365 - 2006
- [j6]Joon S. Park, Ashutosh Deshpande:
Spam Detection: Increasing Accuracy with A Hybrid Solution. Inf. Syst. Manag. 23(1): 57-67 (2006) - [c24]Joon S. Park, Gautam Jayaprakash, Joseph Giordano:
Component Integrity Check and Recovery Against Malicious Codes. AINA (2) 2006: 466-470 - [c23]Gaeil An, Joon S. Park:
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Inscrypt 2006: 182-195 - [c22]Joon S. Park, Avinash T. Suresh, Gaeil An, Joseph Giordano:
A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems. CollaborateCom 2006 - [c21]Joon S. Park, Joseph Giordano:
Role-based profile analysis for scalable and accurate insider-anomaly detection. IPCCC 2006 - [c20]Joon S. Park, Joseph Giordano:
Access Control Requirements for Preventing Insider Threats. ISI 2006: 529-534 - 2005
- [j5]Joon S. Park, Tito Sierra:
Security Analyses for Enterprise Instant Messaging (EIM) Systems. Inf. Secur. J. A Glob. Perspect. 14(1): 26-39 (2005) - [c19]Joon S. Park, Harish S. Krishnan:
Trusted Identity and Session Management Using Secure Cookies. DBSec 2005: 310-324 - [c18]Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park:
Towards an Effective Wireless Security Policy for Sensitive Organizations. ISI 2005: 629-630 - [c17]Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. SEC 2005: 127-142 - 2004
- [c16]Joon S. Park, Abhishek Jain:
A Framework for Trusted Wireless Sensor Networks. DBSec 2004: 371-384 - [c15]Joon S. Park, Pratheep Chandramohan:
Static vs. Dynamic Recovery Models for Survivable Distributed Systems. HICSS 2004 - [c14]Joon S. Park, Pratheep Chandramohan, Joseph Giordano:
Component-abnormality detection and immunization for survivable systems in large distributed environments. IASTED Conf. on Software Engineering and Applications 2004: 102-108 - [c13]Joon S. Park, Shuyuan Mary Ho:
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. ISI 2004: 201-213 - [c12]Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito:
A composite rbac approach for large, complex organizations. SACMAT 2004: 163-172 - 2003
- [j4]Joon S. Park, Derrick Dicoi:
WLAN Security: Current and Future. IEEE Internet Comput. 7(5): 60-65 (2003) - [j3]Joon S. Park:
Towards Secure Collaboration on the Semantic Web. SIGCAS Comput. Soc. 33(2): 1 (2003) - [c11]Joon S. Park, Junseok Hwang:
A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services. ISCC 2003: 1047-1052 - [c10]Joon S. Park, Junseok Hwang:
Role-based access control for collaborative enterprise in peer-to-peer computing environments. SACMAT 2003: 93-99 - 2002
- [c9]Dongwan Shin, Gail-Joon Ahn, Joon S. Park:
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC). COMPSAC 2002: 934-939 - 2001
- [j2]Joon S. Park, Ravi S. Sandhu, Gail-Joon Ahn:
Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1): 37-71 (2001) - [c8]Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu:
Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 - [c7]Myong H. Kang, Joon S. Park, Judith N. Froscher:
Access control mechanisms for inter-organizational workflow. SACMAT 2001: 66-74 - [c6]Joon S. Park, Myong H. Kang, Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182 - 2000
- [j1]Joon S. Park, Ravi S. Sandhu:
Secure Cookies on the Web. IEEE Internet Comput. 4(4): 36-44 (2000) - [c5]Joon S. Park, Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates. ACSAC 2000: 120-127 - [c4]Gail-Joon Ahn, Ravi S. Sandhu, Myong H. Kang, Joon S. Park:
Injecting RBAC to secure a Web-based workflow system. ACM Workshop on Role-Based Access Control 2000: 1-10
1990 – 1999
- 1999
- [c3]Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta:
RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 - [c2]Joon S. Park, Ravi S. Sandhu:
RBAC on the Web by Smart Certificates. ACM Workshop on Role-Based Access Control 1999: 1-9 - 1998
- [c1]Ravi S. Sandhu, Joon S. Park:
Decentralized User-role Assignment for Web-based Intranets. ACM Workshop on Role-Based Access Control 1998: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint