Tip:
Highlight text to annotate it
X
My name is Joon Park.
Originally I was born in Seoul Korea
and currently I am Associate Professor at the School of Information Studies.
I have three key components in my research center for information security.
They are scalability, fine granularity and survivability.
Scalability means if you have a security solution or security technology,
even though itself the technology is very strong,
but if the system is very large or if there are many different kinds of users with
various permissions while their mappings are changing rapidly.
Sometimes we cannot simply use those existing solutions.
So when I say that my system is scalable, that means the solutions can work
not only in a small system but also in a large system or organization.
The second one is fine granularity.
When the size of the organization with the target system is increasing,
simply what we could do is we could just reduce the controlled regularity.
So in my research when I say fine granularity, while the approach is still scalable,
but it still maintains fine granularity so that we can provide more accurate and more secure services.
And the last one is survivability.
So in my approach when I say survivability that means if a software component is compromised
or attacked by internal failures or external attacks, or any different kind of reason.
If something bad happens to the current component, especially in a sensitive organization,
there should be some way to continue the mission of that particular component.
So in my research I try to find some solutions to continue the critical missions,
even though there are some damages or attacks in the target system.
So in summary, in my current research center, I focus on scalability, fine granularity and survivability.
I think the first step is to identify a problem.
And then, including me, we should do some survey. Who have done kind of similar kind of work in this area?
And then what are the actual advantages or some kind of weaknesses in those existing areas.
And then, you know, we can enhance those existing works to solve the problem that I defined.
Well unfortunately, or fortunately, if nobody has done similar kind of work,
then we should start from the scratch. Then there will be more contribution,
I think, although it will take longer time.
And I come up with some new mechanisms or new security models.
This can be applied to all those three different streams.
Then in the second step I try to find some support mechanisms to support… my framework.
In the final step, I try to implement my ideas
and my inventions based on the models or the mechanisms that I developed in the first step.
First of all, whenever I have a new idea,
I draw a very, very brief sketch or make a note, otherwise I will forget.
And then I keep working on that and making some progress on that and in the meantime,
to find some related work, previously I went to library to see,
to read some abstracts or extra papers but nowadays we have digital libraries so since in our case,
our university has a license to these digital libraries such as i-Triply or HCM,
we can easily find high quality research articles there.
One of the issues was kind of time management because as faculty here we have certain time,
right, for teaching service and research. Although, Syracuse, and I was full,
the number one priority is on research, fortunately, but I still have some other commitments and responsibilities.
So sometimes I just talked to myself, I wish I could have more time to do my research
but the time management is kind of my challenge at that time. Another one was kind of team work.
You know, you don’t know what kind of people you are going to work with together,
but different people have different kind of expectations.
Especially if a project is very large project, you have people like twenty or thirty different people
from different angles, different areas and they have different kinds of views.
When I was a PhD student my PhD advisor he was my mentor and certainly at this school,
you know, now I’m tenured actually, but in the beginning when I was a junior faculty member,
the school assigned senior faculty members for me.
But at the school, people have different research backgrounds and different research interests
so in my case I didn’t have any other faculty members whose research backgrounds perfectly matched with mine,
but since they had very good experience, they knew how to research or how to produce better outcomes
so I got very good advice and help from my senior faculty members which I still appreciate.
And another one is my son, actually.
One day he was playing the small Lego blocks.
And then he developed different stuff, like houses, animals, airplanes, vehicles, different kinds of things.
And one day I realized although he can develop different kind of products,
there are just a certain set of building blocks, just the same shape,
different kind of blocks, just colors are different.
But by using all those kinds of common building blocks, you develop,
you can develop different kind of final product.
So I applied that idea to my research here.
So relatively I got involved in some user and permission management project.
Probably the most important step is problem analysis.
What is the problem and what is the weakness in the current shape.
Because some of those people just go to the solution area right away.
I mean, it might work, but in the end, we will see where they are going,
what the problem is, we don’t know that.
//Captioned by Yan Huang//