The UCON ABC usage control model J Park, R Sandhu ACM Transactions on Information and System Security (TISSEC) 7 (1), 128-174, 2004 | 1504 | 2004 |
Towards usage control models: beyond traditional access control J Park, R Sandhu Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 661 | 2002 |
Usage control: A vision for next generation access control R Sandhu, J Park Computer Network Security: Second International Workshop on Mathematical …, 2003 | 375 | 2003 |
Formal model and policy specification of usage control X Zhang, F Parisi-Presicce, R Sandhu, J Park ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005 | 357 | 2005 |
A logical specification for usage control X Zhang, J Park, F Parisi-Presicce, R Sandhu Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 154 | 2004 |
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Y Cheng, J Park, R Sandhu | 137 | 2012 |
A provenance-based access control model J Park, D Nguyen, R Sandhu 2012 tenth annual international conference on privacy, security and trust …, 2012 | 132 | 2012 |
A user-to-user relationship-based access control model for online social networks Y Cheng, J Park, R Sandhu Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012 | 123 | 2012 |
Originator control in usage control J Park, R Sandhu Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 116 | 2002 |
Security architectures for controlled digital information dissemination J Park, R Sandhu, J Schifalacqua Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000 | 116 | 2000 |
Attribute mutability in usage control J Park, X Zhang, R Sandhu Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11 …, 2004 | 109 | 2004 |
Attribute-based access control for AWS internet of things and secure industries of the future S Bhatt, TK Pham, M Gupta, J Benson, J Park, R Sandhu IEEE Access 9, 107200-107223, 2021 | 84 | 2021 |
An access control model for online social networks using user-to-user relationships Y Cheng, J Park, R Sandhu IEEE transactions on dependable and secure computing 13 (4), 424-436, 2015 | 71 | 2015 |
Preserving user privacy from third-party applications in online social networks Y Cheng, J Park, R Sandhu Proceedings of the 22nd international conference on world wide web, 723-728, 2013 | 64 | 2013 |
A user-activity-centric framework for access control in online social networks J Park, R Sandhu, Y Cheng IEEE Internet Computing 15 (5), 62-65, 2011 | 64 | 2011 |
Usage control: A unified framework for next generation access control J Park George Mason University, 2003 | 60 | 2003 |
Schema based XML security: RBAC approach X Zhang, J Park, R Sandhu Data and Applications Security XVII: Status and Prospects, 330-343, 2004 | 57 | 2004 |
Attribute-aware relationship-based access control for online social networks Y Cheng, J Park, R Sandhu Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 55 | 2014 |
A roadmap for privacy-enhanced secure data provenance E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ... Journal of Intelligent Information Systems 43, 481-501, 2014 | 51 | 2014 |
Dependency path patterns as the foundation of access control in provenance-aware systems D Nguyen, J Park, R Sandhu 4th USENIX Workshop on the Theory and Practice of Provenance, 2012 | 46 | 2012 |