Joon S. Park

According to our database1, Joon S. Park authored at least 59 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks.
CoRR, 2024

2023
Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

2021
Leveraging Information Security Continuous Monitoring to Enhance Cybersecurity.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2019
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes.
Proc. Priv. Enhancing Technol., 2019

2016
Cybersecurity Strategies for Smart Grids.
J. Comput., 2016

Security Automation for Information Security Continuous Monitoring: Research Framework.
Proceedings of the IEEE World Congress on Services, 2016

A Security Analysis on Apple Pay.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2014
Social network attack simulation with honeytokens.
Soc. Netw. Anal. Min., 2014

Trusted Online Social Network (OSN) services with optimal data management.
Comput. Secur., 2014

Online Behavioral Advertising (OBA) with privacy protection.
Proceedings of the 2014 World Congress on Internet Security, 2014

Game Theoretic Modeling of Security and Interdependency in a Public Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Component survivability at runtime for mission-critical distributed systems.
J. Supercomput., 2013

Game theoretic attack analysis in online social network (OSN) services.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Surviving in Cyberspace: A Game Theoretic Approach.
J. Commun., 2012

Towards trusted data management in online social network (OSN) services.
Proceedings of the 2012 World Congress on Internet Security, 2012

Optimal State Management of Data Sharing in Online Social Network (OSN) Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012

Near-Real-Time Cloud Auditing for Rapid Response.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Active access control (AAC) with fine-granularity and scalability.
Secur. Commun. Networks, 2011

2009
Towards trusted intelligence information sharing.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications.
Proceedings of the ICEIS 2009, 2009

2008
Problem Analyses and Recommendations in DRM Security Policies.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Fine-Grained and Scalable Message Protection in Sensitive Organizations.
J. Softw., 2007

Trusted P2P computing environments with role-based access control.
IET Inf. Secur., 2007

Countering Insider Threats in Personal Devices.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Fine-Grained and Scalable Approaches for Message Integrity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Cooperative Component Testing Architecture in Collaborating Network Environment.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Spam Detection: Increasing Accuracy with A Hybrid Solution.
Inf. Syst. Manag., 2006

Access Control Requirements for Preventing Insider Threats.
Proceedings of the Intelligence and Security Informatics, 2006

Role-based profile analysis for scalable and accurate insider-anomaly detection.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Component Integrity Check and Recovery Against Malicious Codes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Security Analyses for Enterprise Instant Messaging (EIM) Systems.
Inf. Secur. J. A Glob. Perspect., 2005

Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Towards an Effective Wireless Security Policy for Sensitive Organizations.
Proceedings of the Intelligence and Security Informatics, 2005

Trusted Identity and Session Management Using Secure Cookies.
Proceedings of the Data and Applications Security XIX, 2005

2004
A composite rbac approach for large, complex organizations.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
Proceedings of the Intelligence and Security Informatics, 2004

Component-abnormality detection and immunization for survivable systems in large distributed environments.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

Static vs. Dynamic Recovery Models for Survivable Distributed Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

A Framework for Trusted Wireless Sensor Networks.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Towards Secure Collaboration on the Semantic Web.
SIGCAS Comput. Soc., 2003

WLAN Security: Current and Future.
IEEE Internet Comput., 2003

Role-based access control for collaborative enterprise in peer-to-peer computing environments.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Role-based access control on the web.
ACM Trans. Inf. Syst. Secur., 2001

A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Access control mechanisms for inter-organizational workflow.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001

2000
Secure Cookies on the Web.
IEEE Internet Comput., 2000

Injecting RBAC to secure a Web-based workflow system.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

Binding Identities and Attributes using Digitally Signed Certificates.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
RBAC on the Web by Smart Certificates.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

RBAC on the Web by Secure Cookies.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Decentralized User-role Assignment for Web-based Intranets.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998


  Loading...