Ensuring information assurance in federated identity management D Shin, GJ Ahn, P Shenoy Performance, Computing, and Communications, 2004 IEEE International …, 2004 | 71 | 2004 |
On modeling system-centric information for role engineering D Shin, GJ Ahn, S Cho, S Jin Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 66 | 2003 |
Towards preventing qr code based attacks on android phone using security warnings H Yao, D Shin Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 61 | 2013 |
A novel node level security policy framework for wireless sensor networks WR Claycomb, D Shin Journal of Network and Computer Applications 34 (1), 418-428, 2011 | 53 | 2011 |
An empirical study of visual security cues to prevent the SSLstripping attack D Shin, R Lopes Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 40 | 2011 |
Role-based privilege and trust management D Shin, GJ Ahn COMPUTER SYSTEMS SCIENCE AND ENGINEERING 20 (6), 401, 2005 | 35 | 2005 |
Authorization management for role-based collaboration GJ Ahn, L Zhang, D Shin, B Chu Systems, Man and Cybernetics, 2003. IEEE International Conference on 5, 4128 …, 2003 | 33 | 2003 |
Using a two dimensional colorized barcode solution for authentication in pervasive computing W Claycomb, D Shin Pervasive Services, 2006 ACS/IEEE International Conference on, 173-180, 2006 | 32 | 2006 |
Permission management system: Permission as a service in cloud computing V Echeverria, LM Liebrock, D Shin Computer Software and Applications Conference Workshops (COMPSACW), 2010 …, 2010 | 28 | 2010 |
Secure device pairing using audio WR Claycomb, D Shin Security Technology, 2009. 43rd Annual 2009 International Carnahan …, 2009 | 23 | 2009 |
Secure real world interaction using mobile devices WR Claycomb, D Shin Proc. PERMID, 2006 | 23 | 2006 |
Domain-based virtualized resource management in cloud computing D Shin, H Akkan Collaborative Computing: Networking, Applications and Worksharing …, 2010 | 22 | 2010 |
Role-based EAM using x. 509 attribute certificate D Shin, GJ Ahn, S Cho Proceedings of 16th Annual International Federation for Information …, 2002 | 18 | 2002 |
Supporting visual security cues for WebView-based Android apps D Shin, H Yao, U Rosi Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1867-1876, 2013 | 17 | 2013 |
Information assurance in federated identity management: Experimentations and issues GJ Ahn, D Shin, SP Hong Web Information Systems–WISE 2004, 78-89, 2004 | 17 | 2004 |
Extending formal analysis of mobile device authentication W Claycomb, D Shin Journal of Internet Services and Information Security 1 (1), 86-102, 2011 | 16 | 2011 |
Authenticated dictionary-based attribute sharing in federated identity management D Shin, R Lopes, W Claycomb Information Technology: New Generations, 2009. ITNG'09. Sixth International …, 2009 | 16 | 2009 |
Toward role-based provisioning and access control for infrastructure as a service (IaaS) D Shin, H Akkan, W Claycomb, K Kim Journal of Internet Services and Applications 2 (3), 243-255, 2011 | 15 | 2011 |
Threat modeling for virtual directory services WR Claycomb, D Shin Security Technology, 2009. 43rd Annual 2009 International Carnahan …, 2009 | 14 | 2009 |
Towards privacy in enterprise directory services: a user-centric approach to attribute management W Claycomb, D Shin, D Hareland Security Technology, 2007 41st Annual IEEE International Carnahan Conference …, 2007 | 14 | 2007 |