Joon S. Park
According to our database1,
Joon S. Park
authored at least 59 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks.
CoRR, 2024
2023
Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control.
Proceedings of the IEEE Global Communications Conference, 2023
2022
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2019
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes.
Proc. Priv. Enhancing Technol., 2019
2016
Security Automation for Information Security Continuous Monitoring: Research Framework.
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2014
Comput. Secur., 2014
Proceedings of the 2014 World Congress on Internet Security, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
J. Supercomput., 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Secur. Commun. Networks, 2011
2009
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications.
Proceedings of the ICEIS 2009, 2009
2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
J. Softw., 2007
IET Inf. Secur., 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Inf. Secur. J. A Glob. Perspect., 2005
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the Intelligence and Security Informatics, 2004
Component-abnormality detection and immunization for survivable systems in large distributed environments.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Role-based access control for collaborative enterprise in peer-to-peer computing environments.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
A Middleware Approach for SAINT (Secure, Automatic, Interoperable, and Transparent) Peer-to-Peer Content Services.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2002
An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
A Secure Workflow System for Dynamic Collaboration.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Role-based Access Control on the Web Using LDAP.
Proceedings of the Database and Application Security XV, 2001
2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
RBAC on the Web by Secure Cookies.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998