2009 |
10 | EE | Jeong-Gun Lee,
Eun-Gu Jung,
Wook Shin:
An Asymptotic Performance/Energy Analysis and Optimization of Multi-core Architectures.
ICDCN 2009: 85-90 |
2008 |
9 | EE | Zheng Zeng,
S. Yu,
Wook Shin,
Jennifer C. Hou:
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living.
ICDCS 2008: 233-242 |
2007 |
8 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
ARES 2007: 1160-1166 |
7 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
Enforcement of Integrated Security Policy in Trusted Operating Systems.
IWSEC 2007: 214-229 |
2006 |
6 | EE | Michael J. May,
Wook Shin,
Carl A. Gunter,
Insup Lee:
Securing the drop-box architecture for assisted living.
FMSE 2006: 1-12 |
5 | EE | Hyung Chan Kim,
Wook Shin,
R. S. Ramakrishna,
Kouichi Sakurai:
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
ISPEC 2006: 235-247 |
2005 |
4 | EE | Wook Shin,
Jeong-Gun Lee,
Hong Kook Kim,
Kouichi Sakurai:
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Transactions 88-A(1): 327-330 (2005) |
3 | EE | Wook Shin,
Jong-Youl Park,
Dong-Ik Lee:
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems.
IEICE Transactions 88-D(3): 619-627 (2005) |
2003 |
2 | EE | Wook Shin,
Dong-Ik Lee,
Hyoung-Chun Kim,
Jung-Min Kang,
Jin-Seok Lee:
Extended Role Based Access Control and Procedural Restrictions.
ICISC 2003: 184-196 |
2001 |
1 | EE | Jung-Min Kang,
Wook Shin,
C.-G. Park,
Dong-Ik Lee:
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel.
PRDC 2001: 299-303 |