Остановите войну!
for scientists:
default search action
Jaehong Park
- > Home > Persons > Jaehong Park
Publications
- 2021
- [j32]Smriti Bhatt, Thanh Kim Pham, Maanak Gupta, James O. Benson, Jaehong Park, Ravi S. Sandhu:
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access 9: 107200-107223 (2021) - [j30]Jaehong Park, Ravi S. Sandhu, Maanak Gupta, Smriti Bhatt:
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems. IEEE Access 9: 151004-151022 (2021) - [j29]Rohit Srivastava, Ravi Tomar, Maanak Gupta, Anuj Kumar Yadav, Jaehong Park:
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Inf. 12(8): 310 (2021) - [j28]Jonathan Ebert, Ohad Newton, Jeffery O'Rear, Scott Riley, Jaehong Park, Maanak Gupta:
Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks. Inf. 12(10): 390 (2021) - 2019
- [j25]Gang Wang, Jaehong Park, Ravi S. Sandhu, Jun Wang, Xiaolin Gui:
Dynamic trust evaluation model based on bidding and multi-attributes for social networks. Int. J. High Perform. Comput. Netw. 13(4): 436-454 (2019) - 2017
- [c42]Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park:
Classifying and Comparing Attribute-Based and Relationship-Based Access Control. CODASPY 2017: 59-70 - 2016
- [j21]Lianshan Sun, Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Trans. Dependable Secur. Comput. 13(4): 411-423 (2016) - [j20]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Trans. Dependable Secur. Comput. 13(4): 424-436 (2016) - 2015
- [e3]Jaehong Park, Anna Cinzia Squicciarini:
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015. ACM 2015, ISBN 978-1-4503-3191-3 [contents] - 2014
- [c37]Lianshan Sun, Jaehong Park:
A Process-Oriented Conceptual Framework on Non-Functional Requirements. APRES 2014: 1-15 - [c36]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Attribute-Aware Relationship-Based Access Control for Online Social Networks. DBSec 2014: 292-306 - [c35]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. NSS 2014: 15-27 - [e2]Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2 [contents] - 2013
- [c34]Lianshan Sun, Jaehong Park, Ravi S. Sandhu:
Engineering access control policies for provenance-aware systems. CODASPY 2013: 285-292 - [c33]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
A provenance-based access control model for dynamic separation of duties. PST 2013: 247-256 - [c32]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Preserving user privacy from third-party applications in online social networks. WWW (Companion Volume) 2013: 723-728 - [e1]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - 2012
- [c31]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
A User-to-User Relationship-Based Access Control Model for Online Social Networks. DBSec 2012: 8-24 - [c30]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Integrated provenance data for access control in group-centric collaboration. IRI 2012: 255-262 - [c29]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A provenance-based access control model. PST 2012: 137-144 - [c28]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. SocialCom/PASSAT 2012: 646-655 - [c27]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems. TaPP 2012 - 2011
- [j17]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
A User-Activity-Centric Framework for Access Control in Online Social Networks. IEEE Internet Comput. 15(5): 62-65 (2011) - [c26]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
ACON: Activity-Centric Access Control for Social Computing. ARES 2011: 242-247 - [c24]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
On data provenance in group-centric secure collaboration. CollaborateCom 2011: 221-230 - 2010
- [c20]Jaehong Park, Yuan Cheng, Ravi S. Sandhu:
Towards a framework for cyber social status based trusted open collaboration. CollaborateCom 2010: 1-8 - 2005
- [j9]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park:
Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) - 2004
- [j8]Jaehong Park, Ravi S. Sandhu:
The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - [c17]Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:
Attribute Mutability in Usage Control. DBSec 2004: 15-29 - [c16]Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu:
A logical specification for usage control. SACMAT 2004: 1-10 - 2003
- [c14]Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 - [c13]Ravi S. Sandhu, Jaehong Park:
Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31 - 2002
- [c12]Jaehong Park, Ravi S. Sandhu:
Originator Control in Usage Control. POLICY 2002: 60-66 - [c11]Jaehong Park, Ravi S. Sandhu:
Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64 - 2000
- [c10]Jaehong Park, Ravi S. Sandhu, J. Schifalacqua:
Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 16:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint