Follow
Dongwan Shin
Dongwan Shin
Professor of Computer Science and Engineering, New Mexico Tech
Verified email at nmt.edu - Homepage
Title
Cited by
Cited by
Year
Ensuring information assurance in federated identity management
D Shin, GJ Ahn, P Shenoy
Performance, Computing, and Communications, 2004 IEEE International …, 2004
712004
On modeling system-centric information for role engineering
D Shin, GJ Ahn, S Cho, S Jin
Proceedings of the eighth ACM symposium on Access control models and …, 2003
662003
Towards preventing qr code based attacks on android phone using security warnings
H Yao, D Shin
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
592013
A novel node level security policy framework for wireless sensor networks
WR Claycomb, D Shin
Journal of Network and Computer Applications 34 (1), 418-428, 2011
532011
An empirical study of visual security cues to prevent the SSLstripping attack
D Shin, R Lopes
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
402011
Role-based privilege and trust management
D Shin, GJ Ahn
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 20 (6), 401, 2005
352005
Authorization management for role-based collaboration
GJ Ahn, L Zhang, D Shin, B Chu
Systems, Man and Cybernetics, 2003. IEEE International Conference on 5, 4128 …, 2003
332003
Using a two dimensional colorized barcode solution for authentication in pervasive computing
W Claycomb, D Shin
Pervasive Services, 2006 ACS/IEEE International Conference on, 173-180, 2006
322006
Permission management system: Permission as a service in cloud computing
V Echeverria, LM Liebrock, D Shin
Computer Software and Applications Conference Workshops (COMPSACW), 2010 …, 2010
282010
Secure device pairing using audio
WR Claycomb, D Shin
Security Technology, 2009. 43rd Annual 2009 International Carnahan …, 2009
232009
Secure real world interaction using mobile devices
WR Claycomb, D Shin
Proc. PERMID, 2006
232006
Domain-based virtualized resource management in cloud computing
D Shin, H Akkan
Collaborative Computing: Networking, Applications and Worksharing …, 2010
222010
Role-based EAM using x. 509 attribute certificate
D Shin, GJ Ahn, S Cho
Proceedings of 16th Annual International Federation for Information …, 2002
182002
Supporting visual security cues for WebView-based Android apps
D Shin, H Yao, U Rosi
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1867-1876, 2013
172013
Information assurance in federated identity management: Experimentations and issues
GJ Ahn, D Shin, SP Hong
Web Information Systems–WISE 2004, 78-89, 2004
172004
Extending formal analysis of mobile device authentication
W Claycomb, D Shin
Journal of Internet Services and Information Security 1 (1), 86-102, 2011
162011
Authenticated dictionary-based attribute sharing in federated identity management
D Shin, R Lopes, W Claycomb
Information Technology: New Generations, 2009. ITNG'09. Sixth International …, 2009
162009
Toward role-based provisioning and access control for infrastructure as a service (IaaS)
D Shin, H Akkan, W Claycomb, K Kim
Journal of Internet Services and Applications 2 (3), 243-255, 2011
152011
Threat modeling for virtual directory services
WR Claycomb, D Shin
Security Technology, 2009. 43rd Annual 2009 International Carnahan …, 2009
142009
Towards privacy in enterprise directory services: a user-centric approach to attribute management
W Claycomb, D Shin, D Hareland
Security Technology, 2007 41st Annual IEEE International Carnahan Conference …, 2007
142007
The system can't perform the operation now. Try again later.
Articles 1–20