Research Topc |
Sub-topic |
Publications |
Access Control |
AC in Databases |
- Jong P. Yoon, Chapter 6 “Access Control and Trustiness for Resource Management in Cloud Databases” in the Book entitled “Grid and Cloud Database Management,” edited by G. Aloisio and S. Fiore, published in Summer, 2011.
|pdf|
- Jong P. Yoon, Presto Authorization: A Bitmap Indexing Scheme for High-speed Access Control to XML Documents, IEEE Transactions on Knowledge and Data Engineering, Vol. 18, No. 7, 2006.
|
|
AC in Cloud Computing |
- Jong P. Yoon, SePAL: State-Dependent Management for Secure and Private Access of Wireless Devices to Cloud Databases, vol.2, International Journal of Information System Security, 2011.
- Jong P. Yoon and Z. Chen, Service Trustiness and Resource Legitimacy in Cloud, In the proceedings of the Fifth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan, 2010.
|web|
- Jong P. Yoon and Z. Chen, Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing, In the Proceedings of the Second International Conference on Networked Digital Technologies, 2010.
|pdf|
|
Mobile Computing |
Security Management |
- Jong P. Yoon, Location- and Time-based Trustworthy Correlation of Users, Sites and Resources, in 2nd Int’l Conf. on Pervasive and Embedded Computing and Communication Systems, Rome, Italy, 2012
|
Privacy Management |
- Jong P. Yoon, Christopher M. Frenz, Zhixiong Chen, David Wang, Privacy-Preserving Mobile Accesses for Virtual Private Social Media, IEEE Proceedings of Congress on Services, 2012.
|
Wireless Networks |
Wireless Sensor Networs |
- Jong P. Yoon, Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services, in International Journal on Cloud Computing: Services and Architecture, vol.1, no.3, 2011.
|
Data Mining from WSN |
- Jong P. Yoon and Joyce Yoon, “Interoperating DNA Gene Sequences and Nutrition Provisions for Personalized Wellness,”
in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
entitled “Bio-Inspired Models of Network, Information, and Computing Systems, v. 87, 2012. Earlier version appeared in
1st Workshop on Bio-inspired Models and Technologies for Ambient Information Society, Boston, Dec., 2010.
|web|
|paper|
|
Efficient Data Transmission in WSN |
- Jong P. Yoon, Three-Tiered Data Mining for Bit Data Patterns of Wireless Sensor Networks in
Medical and Healthcare Domains,
The 8th Int’l Conf. on Internet and Web Applications and Services, 2013.
|
Others |
IDS |
- Christopher M. Frenz and Jong P. Yoon, XSSmon: A Perl Based IDS for the Detection of Potential XSS Attacks,
in IEEE Long Island Systems, Applications and Technology Conference, May 4, 2012.
|
Forensics |
- Jong P. Yoon and Z. Chen, Localization and Detection of Vector Logo Image Plagiarism, In the Proceedings of
the 1st Int’l Conference on Digital Forensics and Cyber Crime, 2009, also appeared in the Book entitled “Digital Forensics and Cyber Crime”, Springer, 2010.
|pdf|
|
Audit & Compliance |
- Zhixiong Chen and John Yoon, IT Auditing to Assure a Secure Cloud Computing, In the proceedings of
The 6th IEEE World Congress on Services, July 5-10, 2010, Miami, Florida.
- Zhixiong Chen, John Yoon, Christopher Frenz, Kenneth Compres, IT Governance, Compliance and Auditing Curriculum – A Pedagogical Perspective, Workshop on IT Governance, Risk and Compliance, in conjunction with IEEE World Congress on Services, July 5-10, 2011, Washington D.C.
- Zhixiong Chen and Ivan Arellan, "Better Compliance Management Using Service Oriented Approach For Non-profit Organizations," in the proceedings of the 2009 IEEE Congress on Services, SERVICES-I, pp195-202, Los Angeles, CA, July 6-10, 2009
|pdf|
|
Privacy Management |
- Jong P. Yoon, Christopher M. Frenz, Zhixiong Chen, David Wang, Privacy-Preserving Mobile Accesses for Virtual Private Social Media, IEEE Proceedings of Congress on Services, 2012.
|