Jaehong Park
Jaehong Park
Dirección de correo verificada de uah.edu
TítuloCitado porAño
The UCON ABC usage control model
J Park, R Sandhu
ACM Transactions on Information and System Security (TISSEC) 7 (1), 128-174, 2004
11782004
Towards usage control models: beyond traditional access control
J Park, R Sandhu
Proceedings of the seventh ACM symposium on Access control models and …, 2002
5322002
Usage control: A vision for next generation access control
R Sandhu, J Park
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
2882003
Formal model and policy specification of usage control
X Zhang, F Parisi-Presicce, R Sandhu, J Park
ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005
2832005
A logical specification for usage control
X Zhang, J Park, F Parisi-Presicce, R Sandhu
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1342004
Security architectures for controlled digital information dissemination
J Park, R Sandhu, J Schifalacqua
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
1032000
Originator control in usage control
J Park, R Sandhu
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
972002
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
Y Cheng, J Park, R Sandhu
952012
A user-to-user relationship-based access control model for online social networks
Y Cheng, J Park, R Sandhu
IFIP Annual Conference on Data and Applications Security and Privacy, 8-24, 2012
932012
A provenance-based access control model
J Park, D Nguyen, R Sandhu
2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012
892012
Attribute mutability in usage control
J Park, X Zhang, R Sandhu
Research Directions in Data and Applications Security XVIII, 15-29, 2004
872004
A user-activity-centric framework for access control in online social networks
J Park, R Sandhu, Y Cheng
IEEE Internet Computing 15 (5), 62-65, 2011
552011
Schema based XML security: RBAC approach
X Zhang, J Park, R Sandhu
Data and Applications Security XVII, 330-343, 2004
532004
Usage control: A unified framework for next generation access control
J Park
George Mason University, 2003
442003
Dependency path patterns as the foundation of access control in provenance-aware systems
D Nguyen, J Park, R Sandhu
4th USENIX Workshop on the Theory and Practice of Provenance, 2012
372012
Preserving user privacy from third-party applications in online social networks
Y Cheng, J Park, R Sandhu
Proceedings of the 22nd International Conference on World Wide Web, 723-728, 2013
362013
Attribute-aware relationship-based access control for online social networks
Y Cheng, J Park, R Sandhu
IFIP Annual Conference on Data and Applications Security and Privacy, 292-306, 2014
292014
A provenance-based access control model for dynamic separation of duties
D Nguyen, J Park, R Sandhu
2013 Eleventh Annual Conference on Privacy, Security and Trust, 247-256, 2013
292013
Acon: Activity-centric access control for social computing
J Park, R Sandhu, Y Cheng
2011 Sixth International Conference on Availability, Reliability and …, 2011
262011
A roadmap for privacy-enhanced secure data provenance
E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ...
Journal of Intelligent Information Systems 43 (3), 481-501, 2014
252014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20