2007 |
8 | | Michael Shin,
Bosah Chukwuogo,
Marta Calderón:
Scalability in Analysis of Software Architecture.
Software Engineering Research and Practice 2007: 539-545 |
2006 |
7 | | Michael Shin:
Modeling of Evolution to Secure Application System: from Requirements Model to Software Architecture.
Software Engineering Research and Practice 2006: 797-803 |
2005 |
6 | | Michael Shin,
Marta Calderón:
Meta-Modeling Approach to Tool Support for Model Transformation to Validate Dynamic Behavior of Systems.
Software Engineering Research and Practice 2005: 316-322 |
5 | | Michael Shin,
Yan Xu:
Detection of Anomalies in a Software Architectural Style with Connectors: Position Paper.
Software Engineering Research and Practice 2005: 94-100 |
4 | EE | Danfeng Yao,
Michael Shin,
Roberto Tamassia,
William H. Winsborough:
Visualization of Automated Trust Negotiation.
VizSEC 2005: 8 |
2004 |
3 | EE | Sean Cannella,
Daniel J. Polivy,
Michael Shin,
Christian D. Straub,
Roberto Tamassia:
Secure Visualization of Authentication Information: A Case Study.
VL/HCC 2004: 35-37 |
2003 |
2 | EE | Michael T. Goodrich,
Michael Shin,
Christian D. Straub,
Roberto Tamassia:
Distributed Data Authenication (System Demonstration).
DISCEX (2) 2003: 58-59 |
1 | EE | Michael T. Goodrich,
Michael Shin,
Roberto Tamassia,
William H. Winsborough:
Authenticated Dictionaries for Fresh Attribute Credentials.
iTrust 2003: 332-347 |