Name
Affiliation
Papers
JOON S. PARK
Syracuse Univ, Sch Informat Studies, Syracuse, NY 13244 USA
46
Collaborators
Citations 
PageRank 
52
529
52.78
Referers 
Referees 
References 
980
792
519
Search Limit
100980
Title
Citations
PageRank
Year
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing00.342022
Cybersecurity Strategies for Smart Grids.00.342016
A Security Analysis on Apple Pay.00.342016
Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation.00.342016
Security Automation for Information Security Continuous Monitoring: Research Framework00.342016
Game Theoretic Modeling of Security and Interdependency in a Public Cloud90.662014
Social network attack simulation with honeytokens.50.402014
Trusted Online Social Network (OSN) services with optimal data management.60.452014
Component survivability at runtime for mission-critical distributed systems10.352013
Game theoretic attack analysis in online social network (OSN) services60.462013
Near-Real-Time Cloud Auditing for Rapid Response90.772012
Towards trusted data management in online social network (OSN) services50.452012
A Game Theoretic Approach For Modeling Optimal Data Sharing On Online Social Networks60.462012
Optimal State Management of Data Sharing in Online Social Network (OSN) Services70.452012
Surviving in Cyberspace: A Game Theoretic Approach.60.462012
Active access control (AAC) with fine-granularity and scalability40.462011
Proactive Insider-threat Detection - Against Confidentiality in Sensitive Pervasive Applications00.342009
Towards trusted intelligence information sharing20.422009
Problem Analyses and Recommendations in DRM Security Policies00.342008
Fine-Grained and Scalable Approaches for Message Integrity20.362007
Fine-Grained and Scalable Message Protection in Sensitive Organizations40.422007
Cooperative component testing architecture in collaborating network environment30.452007
Spam Detection: Increasing Accuracy With A Hybrid Solution10.432006
Access control requirements for preventing insider threats20.402006
Component Integrity Check and Recovery Against Malicious Codes40.482006
A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems30.402006
Packet marking based cooperative attack response service for effectively handling suspicious traffic10.362006
Towards an effective wireless security policy for sensitive organizations00.342005
Trusted identity and session management using secure cookies10.442005
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems40.462005
Security Analyses for Enterprise Instant Messaging (EIM) Systems10.352005
A composite rbac approach for large, complex organizations220.952004
A Framework For Trusted Wireless Sensor Networks00.342004
Static vs. dynamic recovery models for survivable distributed systems140.822004
Component-abnormality detection and immunization for survivable systems in large distributed environments20.372004
Role-based access control for collaborative enterprise in peer-to-peer computing environments331.472003
Towards Secure Collaboration on the Semantic Web40.432003
WLAN Security: Current and Future101.402003
An application of directory service markup language (DSML) for role-based access control (RBAC)30.422002
A secure workflow system for dynamic collaboration70.752001
Role-based access control on the web using LDAP50.492001
Access control mechanisms for inter-organizational workflow977.412001
Role-based access control on the web11711.032001
Secure Cookies on the Web705.902000
RBAC on the Web by smart certificates323.901999
Decentralized user-role assignment for Web-based intranets214.081998