Dongwan Shin

Orcid: 0000-0002-2151-3986

According to our database1, Dongwan Shin authored at least 88 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust.
J. Cybersecur. Priv., June, 2024

2023
Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks.
Proceedings of the International Conference on Smart Applications, 2023

2022
Ontology-based user privacy management in smart grid.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

A Mapping Study on Privacy Attacks in Big Data and IoT.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Differential privacy applied to smart meters: a mapping study.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Behavior control-based approach to influencing user's cybersecurity actions using mobile news app.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices.
IEEE Access, 2020

On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020

Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020

On Matching Log Analysis to Source Code: A Systematic Mapping Study.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020

2019
Developing a mental model for use in the context of computer security.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
An Empirical Study of SSL Usage in Android Apps.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
An efficient approach to securing user data in android.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
Virtual machine scheduling based on task characteristic.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
A novel device for secure home E-voting.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

An enhanced approach to preventing the SSLstripping attack.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2014
Detection of shellcodes in drive-by attacks using kernel machines.
J. Comput. Virol. Hacking Tech., 2014

Advanced technologies for homeland defense and security.
J. Netw. Comput. Appl., 2014

Editorial.
Comput. Secur., 2014

Detection of plugin misuse drive-by download attacks using kernel machines.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Supporting visual security cues for WebView-based Android apps.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards multi-policy support for IaaS clouds to secure data sharing.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Towards preventing QR code based attacks on android phone using security warnings.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
HLS-dv: A High-Level Synthesis Framework for Dual-Vdd Architectures.
IEEE Trans. Very Large Scale Integr. Syst., 2012

An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity.
Smart Comput. Rev., 2012

Enhancing directory virtualization to detect insider activity.
Secur. Commun. Networks, 2012

A policy-based decentralized authorization management framework for cloud computing.
Proceedings of the ACM Symposium on Applied Computing, 2012

Similarity analysis of shellcodes in drive-by download attack kits.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Addressing Insider Threats and Information Leakage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

A novel node level security policy framework for wireless sensor networks.
J. Netw. Comput. Appl., 2011

Extending Formal Analysis of Mobile Device Authentication.
J. Internet Serv. Inf. Secur., 2011

Toward role-based provisioning and access control for infrastructure as a service (IaaS).
J. Internet Serv. Appl., 2011

Formal analysis of device authentication applications in ubiquitous computing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

An empirical study of visual security cues to prevent the SSLstripping attack.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
A visual way to talk to strangers: authentication in wireless pervasive computing.
Int. J. Ad Hoc Ubiquitous Comput., 2010

A framework for risk analysis in virtual directory security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A group-based security policy for wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Permission Management System: Permission as a Service in Cloud Computing.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Towards Secure Virtual Directories: A Risk Analysis Framework.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Domain-based virtualized resource management in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Detecting insider activity using enhanced directory virtualization.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
A User Controlled Approach for Securing Sensitive Information in Directory Services.
J. Univers. Comput. Sci., 2009

An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information.
Proceedings of the Security in Information Systems, 2009

Key Establishment Using Group Information for Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software, 2009

Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Framework for Enabling User-Controlled Persona in Online Social Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

An opensocial extension for enabling user-controlled persona in online social networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
An Interactive Design Environment for C-Based High-Level Synthesis of RTL Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2008

System-on-Chip Environment: A SpecC-Based Framework for Heterogeneous MPSoC Design.
EURASIP J. Embed. Syst., 2008

Specify-explore-refine (SER): from specification to implementation.
Proceedings of the 45th Design Automation Conference, 2008

Enabling Interoperable and Selective Data Sharing among Social Networking Sites.
Proceedings of the Collaborative Computing: Networking, 2008

Protecting Sensitive Information in Directory Services Using Virtual Directories.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Automatic Layer-Based Generation of System-On-Chip Bus Communication Models.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2007

Towards secure resource sharing for impromptu collaboration in pervasive computing.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

An Interactive Design Environment for C-based High-Level Synthesis.
Proceedings of the Embedded System Design: Topics, Techniques and Trends, IFIP TC10 Working Conference: International Embedded Systems Symposium (IESS), May 30, 2007

Controlled sharing of identity attributes for better privacy.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Enabling mobility in enterprise security management.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006

Modeling Role-based Trust and Authority in Open Environments.
Proceedings of the 2006 International Conference on Security & Management, 2006

A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Automatic generation of transaction level models for rapid design space exploration.
Proceedings of the 4th International Conference on Hardware/Software Codesign and System Synthesis, 2006

Mobile-driven architecture for managing enterprise security policies.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Pipelining with common operands for power-efficient linear systems.
IEEE Trans. Very Large Scale Integr. Syst., 2005

Role-based privilege and trust management.
Comput. Syst. Sci. Eng., 2005

Securing Spontaneous Communications inWireless Pervasive Computing Environments.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Automatic Generation of Communication Architectures.
Proceedings of the From Specification to Embedded Systems Application [International Embedded Systems Symposium, 2005

Automatic network generation for system-on-chip communication design.
Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2005

System-level communication modeling for network-on-chip synthesis.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

Visual Device identification for Security Services in Ad-Hoc Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005

2004
A role-based infrastructure management system: design and implementation.
Concurr. Pract. Exp., 2004

Information Assurance in Federated Identity Management: Experimentations and Issues.
Proceedings of the Web Information Systems, 2004

Role-Based Privilege Management Using Attribute Certificates and Delegation.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Ensuring information assurance in federated identity management.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Automatic generation of bus functional models from transaction level models.
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004

Role-based Trust Assignment in Trust Management Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Authorization management for role-based collaboration.
Proceedings of the IEEE International Conference on Systems, 2003

On modeling system-centric information for role engineering.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Automatic communication refinement for system level design.
Proceedings of the 40th Design Automation Conference, 2003

2002
Towards Scalable Authentication in Health Services.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

Using X.509 Attribute Certificates for Role-Based EAM.
Proceedings of the Research Directions in Data and Applications Security, 2002

An Application of Directory Service Markup Language (DSML) for Role-Based Access Control (RBAC).
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Low power pipelining of linear systems: a common operand centric approach.
Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 2001

High-level synthesis under multi-cycle interconnect delay.
Proceedings of ASP-DAC 2001, 2001

1997
Low power high level synthesis by increasing data correlation.
Proceedings of the 1997 International Symposium on Low Power Electronics and Design, 1997

1992
Probabilistic Information Capacity of Hopfield Associative Memory.
Complex Syst., 1992


  Loading...