Journals and Book Chapters
Manoj Cherukuri, Srinivas Mukkamala, and Dongwan Shin. "Detection of Shellcodes in Drive-by Attacks using Kernel Machines," Journal of Computer Virology and Hacking Techniques, Springer, 10(3), 2014.
Dongwan Shin and Huiping Yao. "A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone," Journal of Wireless Mobile Networks, Uniquitous Computing, and Dependable Applications, 4(4), 2013.
Dongwan Shin, Rodrigo Lopes, and Seok-Woo Jang. "An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity", Smart Computing Review, KAIS, 2012.
William Claycomb, Dongwan Shin, and Gail-Joon Ahn. "Enhancing Directory Virtualization to Detect Insider Activity," Security and Communication Networks, Wiley, 5(8), 2012.
Dongwan Shin, Hakan Akkan, and William Claycomb. "Towards Role-based Provisioning andAccess Control for Infrastructure as a Service (IaaS)", In Journal of Internet Services and Applications, Springer, 2(3), 2011.
William Claycomb and Dongwan Shin. "Extending Formal Analysis of Mobile Device Authentication Applications," In Journal of Internet Services and Information Security, 1(1), 2011.
William Claycomb and Dongwan Shin. "A Novel Node Level Security Policy Framework for Wireless Sensor Networks," In Journal of Network and Computer Applications, Elsevier, 34(1), 2010.
Dongwan Shin, William Claycomb, and Seunghyun Im. "A Visual Way to Talk to Strangers: Authentication in Ubiquitous Computing," In International Journal of Ad Hoc and Ubiquitous Computing, InderScience, 5(4), 2010.
William Claycomb and Dongwan Shin. "A User-controlled Approach for Securing Sensitive Information in Directory Services," In Journal of Universal Computer Science, 15(15), 2009.
Dongwan Shin and Gail-Joon Ahn. "Role-based Privilege and Trust Management," In Computer Science, Systems & Engineering Journal, 20(6), CRL Publishing, 2005.
Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, and Seunghun Jin. "A Role-based Infrastructure Management System: Design and Implementation," In Concurrency and Computation: Practice and Experience, 16(11), John Wiley & Sons, 2004.
Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. "Role-based EAM Using X.509 Attribute Certificate," in Ehud Gudes and Sujeet Shenoi, Editors, Research Directions in Data and Application Security, Kluwer, 2003.
Confrences, Symposia, and Workshops
Suranya Jayan, Jiangfeng Sun, and Dongwan Shin. "An Efficient Approach to Securing User Data in Android," In Proceedings of IEEE International Conference on ICT Convergence (ICTC 2017), Jeju, South Korea, October 18-20, 2017.
Taegyu Hwang, Kisu Kim, Jeonghwan Lee, Jiman Hong, and Dongwan Shin. "Virtual Machine Scheduling based on Task Characteristic," In Proceedings of 31st ACM Symposium on Applied Computing (SAC16), Pisa, Italy, April 4-8, 2016.
Daniel Fairweather, Henry Mozer, Sterling Rinehart, and Dongwan Shin. "An Enhanced Approach to Preventing the SSLstripping Attack," In Proceedings of IEEE International Conference on ICT Convergence (ICTC 2015), Jeju, South Korea, October 28-30, 2015.
Cristobal Gallegos and Dongwan Shin. "A Novel Device for Secure Home E-Voting," In Proceedings of ACM Research in Adaptive and Convergent Systems (ACM RACS 2015), Prague, Czech Republic, October 9-12, 2015.
Manoj Cherukuri, Srinivas Mukkamala, and Dongwan Shin. "Detection of Plugin Misuse Drive-By Download Attacks using Kernel Machines," In Proceedings of the 9th International Workshop on Trusted Collaboration (TrustCol14 - in conjunction with CollaborateCom 14), Miami,FL, October 22, 2014.
Dongwan Shin and Huiping Yao. "A User Study of Security Warnings for Detecting QR Code-Based Attacks on Android Phone," In Proceedings of the 5th International Workshop on Managing Insider Security Threats (MIST 2013), Pusan, South Korea, October 24-25, 2013.
Ying Wang and Dongwan Shin. "Towards Multi-policy Support for IaaS Clouds to Secure Data Sharing," In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), Austin, Texas, October 20-23, 2013.
Huiping Yao and Dongwan Shin. "An Empirical Study of Security Warnings to Prevent QR Code-Based Attacks on Android Phone," In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 13), Hangzhou, China, May 7-10, 2013.
Dongwan Shin, Huiping Yao, and Une Rosi. "Supporting Visual Security Cues for WebView-based Android Apps," In Proceedings of the 28th ACM Symposium on Applied Computing (SAC13), Coimbra, Portugal, March 18-22, 2013.
Manoj Cherukuri, Srinivas Mukkamala, and Dongwan Shin. "Similarity Analysis of Shellcodesin Drive-by Download Attack Kits," In Proceedings of the 7th International Workshop on Trusted Collaboration (TrustCol’12 - in conjunction with CollaborateCom 12), Pittsburgh, PA, October 14, 2012
Dongwan Shin, Ying Wang, and William Claycomb. "A Policy-based Decentralized Authorization Management Framework for Cloud Computing," In Proceedings of the 27th ACM Symposium on Applied Computing (SAC 12), Riva del Garda, Italy, March 26-30, 2012.
Dongwan Shin and Rodrigo Lopes. "An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack," In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC 11), Orlando, Florida, December 5-9, 2011.
William Claycomb and Dongwan Shin. "Formal Analysis of Device Authentication Applications in Ubiquitous Computing" In Proceedings of the 26th ACM Symposium on Applied Computing (SAC 11), TaiChung, Taiwan, March 21-24, 2011.
Dongwan Shin and Hakan Akkan."Domain-based Virtualized Resource Management in Cloud Computing" In Proceedings of the 5th International Workshop on Trusted Collaboration (TrustCol 10 - in conjunction with CollaborateCom 10), Chicago, October 9, 2010.
William Claycomb and Dongwan Shin. "Detecting Insider Activity Using Enhanced Directory Virtualization," In Proceedings of the ACM Workshop on Insider Threat (held in conjunction with ACM CCS 2010), Chicago, IL, October 8, 2010
Victor Echeverria, Lorie M. Liebrock, and Dongwan Shin. "Permission Management System: Permission as a Service in Cloud Computing," In Proceedings of the 1st IEEE International Workshop on Emerging Applications for Cloud Computing (CloudApp 10 - in conjunction with Compsac 10), Seoul, South Korea, July 19-23, 2010
William Claycomb and Dongwan Shin. "Towards Secure Virtual Directories: A Risk Analysis Framework," In Proceedings of the 34th IEEE International Computer Software and Applications Conference (Compsac 10), Seoul, South Korea, July 19-23, 2010.
William Claycomb, Rodrigo Lopes, Dongwan Shin, and Byunggi Kim. "Group-based Security Policy in Wireless Sensor Networks," In Proceedings of the 25th ACM Symposium on Applied Computing (SAC 10), Sierre, Switzerland, March 22-26, 2010.
William Claycomb and Dongwan Shin. "A Framework for Risk Analysis in Virtual Directory Security," In Proceedings of the 25th ACM Symposium on Applied Computing (SAC 10), Sierre, Switzerland, March 22-26, 2010.
Rodrigo Lopes, Hakan Akkan, William Claycomb, and Dongwan Shin. "An OpenSocial Extension for Enabling User-controlled Persona in Online Social Networks," In Proceedings of the 4th International Workshop on Trusted Collaboration (TrustCol 09 - in conjunction with CollaborateCom 09), Washington DC, November 11, 2009.
William Claycomb, Rodrigo Lopes, Dongwan Shin, and Byunggi Kim. "Key Establishment using Group Information for Wireless Sensor Networks," In Proceedings of the 1st International Conference on Sensor Systems and Software (S-Cube 09), Pisa, Italy, September 9-8, 2009.
William Claycomb and Dongwan Shin. "Threat Modeling for Virtual Directory Services, In Proceedings of the 43rd IEEE International Carnahan Conference on Security Technology, Zurich, Switzerland, October 508, 2009
William Claycomb and Dongwan Shin. Secure Device Pairing Using Audio, In Proceedings of the 43rd IEEE International Carnahan Conference on Security Technology, Zurich, Switzerland, October 5-8, 2009.
Dongwan Shin, Rodrigo Lopes, William Claycomb, and Gail-Joon Ahn. "A Framework for Enabling User-controlled Persona in Online Social Networks," In Proceedings of the 33rd IEEE International Computer Software and Applications Conference (Compsac 09), Seattle, Washington, July 20-24, 2009
William Claycomb and Dongwan Shin. "An Enhanced Approach to Using Virtual Directories for Protecting Sensitive Information," In Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS 09), Milan, Italy, May 5-10, 2009
Dongwan Shin, Rodrigo Lopes, and William Claycomb. "Authenticated Dictionary-based Attribute Sharing in Federated Identity Management," In Proceedings of the 6th International Conference on Information Technology: New Generation, Las Vegas, Nevada, April 27-29, 2009
Dongwan Shin and Rodrigo Lopes. "Enabling Interoperable and Selective Data Sharing among Social Networks Sites," In Proceedings of the 3rd International Workshop on Trusted Collaboration (TrustCol 08 - in conjunction with CollaborateCom 08), Orlando, Florida, November 13, 2008.
William Claycomb and Dongwan Shin. "Protecting Sensitive Information in Directory Service using Virtual Directories," In Proceedings of the 4th International Conference on Collaborative Computing (CollaborateCom 08), Orlando, Florida, November 13-16, 2008.
Rodrigo Lopes and Dongwan Shin. "Controlled Sharing of Identity Attributes for Better Privacy," In Proceedings of the 2nd International Workshop on Trusted Collaboration (TrustCol 07 - in conjunction with CollaborateCom 07), White Plains, USA, November 12-15, 2007.
William Claycomb and Dongwan Shin. "Enabling Delegation for Impromptu Collaboration in Pervasive Computing," In Proceedings of the 22nd IEEE International Symposium on Computer and Information Sciences (ISCIS 07), Ankara, Turkey, November 7-9, 2007.
William Claycomb, Dongwan Shin, and Della Hareland. "Towards Privacy in Enterprise Directory Services: A User-centric Approach to Attribute Management," In Proceedings of the 41th IEEE International Carnahan Conference on Security Technology, Ottawa, Ontario, Canada, October 8-11, 2007.
William Claycomb and Dongwan Shin. "Towards Secure Resource Sharing for Impromptu Collaboration in Pervasive Computing," In Proceedings of the 22nd ACM Symposium on Applied Computing (SAC 07), Seoul, South Korea, March 11-15, 2007.
William Claycomb and Dongwan Shin. "A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing," In Proceedings of the International Workshop on Trusted Collaboration (TrustCol 06 - in conjunction with CollaborateCom 06), Atlanta, USA, November 17-21, 2006.
William Claycomb and Dongwan Shin. "Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing," In Proceedings of the IEEE International Conference of Pervasive Services (ICPS 06), Lyon, France, June 26-29, 2006.
Dongwan Shin. "Modeling Role-Based Trust and Authority in Open Environments," In Proceedings of the International Conference on Security and Management (SAM 06), Las Vegas, NV, June 26-29, 2006.
William Claycomb and Dongwan Shin. "Secure Real World Interaction using Mobile Devices," In Proceedings of Pervasive Mobile Interaction Devices (Permid 06 - in conjunction with Pervasive 06), LNCS, Dublin, Ireland, May 7, 2006.
William Claycomb and Dongwan Shin. "Enabling Mobility in Enterprise Security Management," In Proceedings of IEEE Workshop on Information Assurance (WIA 06 - in conjunction with IEEE IPCCC 06), Phoenix, Arizona, April 10-12, 2006.
William Claycomb and Dongwan Shin. "Mobile-driven Architecture for Managing Enterprise Security Policies," In Proceedings of 44th ACM Southeast Conference (ACMSE 06), Melbourne, FL, March 10-12, 2006.
Dongwan Shin. "Securing Spontaneous Communications in Wireless Pervasive Computing Environments," In Proceedings of IEEE Workshop on Security and Privacy Multimedia Environments (MultiSec 05 - in conjunction with IEEE ISM 05), Irvine, CA, December 12-14, 2005.
Dongwan Shin and Seunghyun Im. "Visual Device Identification for Security Services in Ad-Hoc Wireless Networks," in Tuna Tugcu et al, Editors, New Trends in Computer Networks, Imperial College Press, 2005. (20th International Symposium on Computer and Information Sciences (ISCIS 05)) (ISBN 1-86094611-9)
Gail-Joon Ahn, Dongwan Shin, and Prasad Shenoy. "Information Assurance in Federated Identity Management: Experimentations and Issues," In Proceedings of 15th International Conference on Web Information Systems Engineering (WISE 04), Lecture Notes in Computer Science (LNCS), Brisbane, Australia, November 22-24, 2004.
Dongwan Shin and Gail-Joon Ahn. "Role-based Trust Assignment in Trust Management Systems," In Proceedings of International Workshop on Security in Parallel and Distributed Systems (in conjunction with PDCS 04)), San Francisco, USA, September 15-17, 2004.
Gail-Joon Ahn, Dongwan Shin, and Longhua Zhang. "Role-based Privilege Management Using Attribute Certificates and Delegation," In Proceedings of International Conference on Trust and Privacy in Digital Business (TrustBus 04), Lecture Notes in Computer Science (LNCS), August 30-September 3, 2004.
Dongwan Shin, Gail-Joon Ahn, and Prasad Shenoy. "Ensuring Information Assurance in Federated Identity Management," In Proceedings of the 23rd IEEE International Performance Computing and Communications Conference (IPCCC 04), Phoenix, Arizona, April 14-17, 2004.
Prasad Shenoy, Dongwan Shin, and Gail-Joon Ahn. "Towards IA-Aware Web Services for Federated Identity Management," In Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 03), New York City, USA, December 10-12, 2003.
Gail-Joon Ahn, Longhua Zhang, Dongwan Shin, and Bill Chu. "Authorization Management for Role-based Collaboration," In Proceedings of IEEE International Conference on System, Man and Cybernetic (SMC 03), Washington, D.C., October 5-8, 2003.
Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, and Seunghyn Jin. "On Modeling System-centric Information for Role Engineering," In Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT 03), Villa Gallia, Como, Italy, June 2-3, 2003.
Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, and Seunghun Jin. "A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation," In Proceedings of 18th ACM Symposium on Applied Computing (SAC 03), Melbourne, Florida, USA, March 9-12, 2003.
Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. "Role-based EAM Using X.509 Attribute Certificate," In Proceedings of 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 02), King's College, University of Cambridge, UK, July 29-31, 2002.
Dongwan Shin, Gail-Joon Ahn, and Joon S. Park. "An application of DSML for RBAC," In Proceedings of 26th IEEE Annual International Computer Software and Application Conference (CompSac 02, Position Paper), Oxford, England, August 26-29, 2002.
Gail-Joon Ahn and Dongwan Shin. "Towards Scalable Authentication in Health Services," In Proceedings of 7th IEEE International Workshop on Enterprise Security (WETICE 02), CMU, PA, June 10-12, 2002.
Posters, Work-In-Progress, and Demo
Daniel Fairweather and Dongwan Shin. "Demo: A Chrome Extensin to Prevent the SSLstripping Attack," In Symposium on Usable Privacy and Security (SOUPS 12), Washington DC, July 11-13, 2012.
Rodrigo Lopes and Dongwan Shin. "Preventing SSLstripping Attack using Visual Security Cues," In Symposium on Usable Privacy and Security (SOUPS 11), Poster Abstract, Pittsburgh, PA, July 20-22, 2011.
William Claycomb and Dongwan Shin. "Designing and Implementing Access Control for Impromptu Collaboration," In Annual Computer Security Application Conference (ACSAC 06), Works-in-Progress, Miami Beach, Florida, December 11-15, 2006.
Technical Publications
Rodrigo Lopes and Dongwan Shin. "Towards Secure Infrastructure Management System Development," Technical Report, SIS-Fall-07-01, New Mexico Tech, September 2007. Also submitted to Sandia National Laboratories.
Prasad Shenoy, Badrinath Mohan, and Uttam Sankhala, Dongwan Shin, and Gail-Joon Ahn."Comparative Study of Microsoft .NET Passport and Liberty Alliance," Technical Report, LIISP-Fall-03-01, UNC Charlotte, August 2003. Also submitted to Bank of America(copyrighted material).
Dongwan Shin and Gail-Joon Ahn. "Engineering Role-based Infrastructure Management System," Technical Report, LIISP-Spring-03-01, UNC Charlotte, May 2003. Also submitted to Electronics and Telecommunications Research Institute (ETRI).
Dongwan Shin, Gail-Joon Ahn, and Zhaoyu Liu. "On Email Spoofing and Web Spoofing," Technical Report, LIISP-Summer-02-01, UNC Charlotte, July 2002. Also submitted to Bank of America.
Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. "Role-based Access Control on Privilege Management Infrastructure," Technical Report, LIISP-Spring-02-01, UNC Charlotte, May 2002. Also submitted to Electronics and Telecommunications Research Institute (ETRI).