Michael Eonsuk Shin

Orcid: 0000-0002-4380-7213

According to our database1, Michael Eonsuk Shin authored at least 43 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Modeling of Security Fault-Tolerant Requirements for Secure Systems.
Int. J. Softw. Eng. Knowl. Eng., January, 2023

2022
Secure Software Architectural Patterns Designed with Secure Connectors.
Proceedings of the 17th International Conference on Software Technologies, 2022

2021
Design of Secure Connectors for Complex Message Communications in Software Architecture.
Proceedings of the ESSE 2021: 2nd European Symposium on Software Engineering, Larissa, Greece, November 19, 2021

2020
Threat and Security Modeling for Secure Software Requirements and Architecture.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Security Fault Tolerance for Access Control.
Proceedings of the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2018
Blackboard Architecture for Detecting and Notifying Failures for Component-Based Unmanned Systems.
J. Intell. Robotic Syst., 2018

Analysis of Security-Failure Tolerant Requirements.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures.
Proceedings of the Software Technologies - 13th International Conference, 2018

A Software Product Line Approach for Feature Modeling and Design of Secure Connectors.
Proceedings of the 13th International Conference on Software Technologies, 2018

2017
Security Requirements for Tolerating Security Failures.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Model-based Design of Reusable Secure Connectors.
Proceedings of MODELS 2017 Satellite Event: Workshops (ModComp, 2017

2016
Design of Secure Software Architectures with Secure Connectors.
Int. J. Softw. Eng. Knowl. Eng., 2016

Reusable Secure Connectors for Secure Software Architecture.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

2014
Detection and Notification of Failures in Distributed Component-Based Robot Applications Using Blackboard Architecture.
Proceedings of the Distributed Autonomous Robotic Systems, 2014

2013
Threat Modeling for Security Failure-Tolerant Requirements.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Connectors for Secure Software Architectures .
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Reconfiguration of Robot Applications using Data Dependency and Impact Analysis.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

2011
Component-Based Malicious Software Engineer Intrusion Detection.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Self-Management of External Device Failures in Embedded Software Systems.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

2010
Detection of Malicious Software Engineer Intrusion.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Self-Management of Component Executors for Robot Applications.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

2009
Design of Wrapper for Self-Management of COTS Components.
Int. J. Softw. Eng. Knowl. Eng., 2009

Consistency in Self-Reconfiguration of Self-Healing Systems.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Separating application and security concerns in use case models.
Proceedings of the 15th workshop on Early aspects, 2009

2008
Multiple-view modelling and meta-modelling of software product lines.
IET Softw., 2008

A Case Study: Self-managed COTS Component-based Elevator System.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

2007
Software requirements and architecture modeling for evolving non-secure applications into secure applications.
Sci. Comput. Program., 2007

Automated Software Product Line Engineering and Product Derivation.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Detection of anomalies in software architecture with connectors.
Sci. Comput. Program., 2006

Enhanced Anomaly Detection in Self-Healing Components.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Self-Management of COTS Component-Based Systems Using Wrappers.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Connector-based self-healing mechanism for components of a reliable system.
ACM SIGSOFT Softw. Eng. Notes, 2005

Self-healing components in robust software architecture for concurrent and distributed systems.
Sci. Comput. Program., 2005

Analyzing Dynamic Behavior Of Large-Scale Systems Through Model Transformation.
Int. J. Softw. Eng. Knowl. Eng., 2005

2004
Software Architecture for Self-Healing of Concurrent and Distributed Components.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

A Multiple-View Meta-modeling Approach for Variability Management in Software Product Lines.
Proceedings of the Software Reuse: Methods, 2004

Modeling Complex Systems by Separating Application and Security Concerns.
Proceedings of the 9th International Conference on Engineering of Complex Computer Systems (ICECCS 2004), 2004

2002
Reconstructing a formal security model.
Inf. Softw. Technol., 2002

Multiple-View Meta-Modeling of Software Product Lines.
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002

2001
Role-Based Authorization Constraints Specification Using Object Constraint Language.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Reusable component interconnection patterns for distributed software architectures.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability: Putting Software Reuse in Context, 2001

2000
UML-Based Representation of Role-Based Access Control.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Integration of the Domain Modeling Method for Families of Systems with the SOFL Formal Specification Language.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000


  Loading...