Post Job Free
Sign in

Access Control Management

Location:
Socorro, NM
Posted:
October 07, 2012

Contact this candidate

Resume:

Curriculum Vitae

Dongwan Shin

* ************

1.1 Contact Information

Position: Associate Professor

Office: Computer Science & Engineering

New Mexico Tech., Cramer 211

*** ***** *****, *******, NM 87801

575-***-****

(office), 575-***-**** (fax)

Email: abos0q@r.postjobfree.com

Website: http://www.cs.nmt.edu/ doshin

1.2 Career Objectives

The consequence of rapid advances in computing and its ubiquity has brought the

importance of com-

puter security to the fore. In order to support information assurance for current and

future computing

systems, continuing research & development, and education in the area of information

security are

strongly required. My career objective is to play a major role in this arena by pursuing

research &

development, and education program in computer and information security.

1.3

Education

Ph.D

. in Information Technology, University of North Carolina at Charlotte, USA, 12/2004

M.S

. in Computer Science, University of North Carolina at Charlotte, USA, 12/1999

1.4 Specialities

Access control

Identity and privacy management

Wireless sensor and mobile computing

Distributed and cloud computing

2 EMPLOYMENT

New Mexico Institute of Mining and Technology

2010 onwards Associate Professor

2005

2010Assistant ProfessorDepartment of Computer Science & Engineering

New Mexico Tech, Socorro, New Mexico

University of North Carolina at Charlotte

2001

December 2004Research Assistant

Summer 2001

2003System Administrator

2000

Spring 2001Teaching AssistantCollege of Computing and Informatics

UNC Charlotte, Charlotte, North Carolina

1

3 RESEARCH ACCOMPLISHMENTS

3.1 Research at New Mexico Tech: 2005 onwards

1. Trustworthy Computing: Collaborative Research: User-controlled Persona in Virtual

Community

Sponsor: National Science Foundation, $209,748 - PI (no co-PI), 2009-12

2. ENSL:Experimental Network of Sensors Lab for Advancing Research

Sponsor: National Science Foundation (CRI), $160,000 - co-PI (PI: Dr. Hamdy Soliman),

2007-11

3. ARIEL: An Advanced Security Policy Engineering Framework for Protecting Dis-

tributed and Critical Systems

Sponsor: Sandia National Laboratories (SURP), $40,000 - PI (no co-PI), 2007-8

4. R&D: Secure Infrastructure Management Systems

Sponsor: Sandia National Laboratories, $9,000 - PI (no co-PI), 2007

5. DoD Information Assurance Scholarship Program: Capacity Building

Sponsor: Department of Defense, $41,168 - co-PI (PI: Dr. Andrew Sung), 2006-7

6. DoD Information Assurance Scholarship Program: Capacity Building

Sponsor: Department of Defense, $74,078 - co-PI (PI: Dr. Andrew Sung), 2005-6

7. Building a Secure State-of-the-Art Embedded Real-Time Systems Laboratory at NMT

Sponsor: Intel Corporation, $62,000 - co-PI (PI: Dr. Xiao Qin

), 2005-6

3.2 Prior Years:

2000

- 2004

The following list describes various funded projects (PI: Dr. Gail-Joon Ahn) that I have

actively

participated in, while serving as a Research Assistant at UNC Charlotte. Topics cover

authentication,

access control, trust management, security and privacy issues for e-business, and applied

cryptographic

techniques. Duties involved conducting research, contributing to grant proposals, and

publication and

presentation of research works.

1. Collaborative Research: Secure Information Sharing in Internet-based Collaborative

Applications

Sponsor:

National Science Foundation

(NSF), Summer 2003 - December 2004

2. Privacy Attribute Management

Sponsor:

Bank of America, Fall 2003 - December 2004

3. Engineering Role-based Infrastructure Management System

Sponsor:

Electronics and Telecommunications Research Institute, Summer 2002 - Spring 2003

4. Access and Identity Management

Sponsor:

Bank of America, Fall 2002 - Summer 20035. Email Fraud Protection for Financial Services

Sponsor:

Bank of America, Summer 20026

. Role-based Access Control on Privilege Management Infrastructure

Sponsor: Electronics and Telecommunications Research Institute,

Summer 2001 - Spring 2002

7. Scalable Token-based Authentication: Architecture and Mechanisms

Sponsor: National Science Foundation (NSF), Fall 2001

2

4 PUBLICATIONS

IEEE

IPCCC 06), Phoenix, Arizona, April 10-12, 2006.

29. William Claycomb and Dongwan Shin. Mobile-driven Architecture for Managing

Enterprise

Security Policies, In Proceedings of 44th ACM Southeast Conference (ACMSE 06),

Melbourne,

FL, March 10-12, 2006.

30. Dongwan Shin. Securing Spontaneous Communications in Wireless Pervasive Computing En-

vironments, In Proceedings of IEEE International Symposium on Multimedia

(ISM 05),

Irvine,

CA, December 12-14, 2005.

31. Gail-Joon Ahn, Dongwan Shin, and Prasad Shenoy. Information Assurance in Federated

Iden-

tity Management: Experimentations and Issues, In Proceedings of International Conference

on

Web Information Systems Engineering (WISE 04), Lecture Notes in Computer Science,

Brisbane,

Australia, November 22-24, 2004.

32. Dongwan Shin and Gail-Joon Ahn. Role-based Trust Assignment in Trust Management Sys-

tems, In Proceedings of the 17th International Conference on Parallel and Distributed

Computing

Systems (PDCS 04), San Francisco, USA, September 15-17, 2004.

33. Gail-Joon Ahn, Dongwan Shin, and Longhua Zhang. Role-based Privilege Management

Using

Attribute Certificates and Delegation, In Proceedings of International Conference on

Trust and

Privacy in Digital Business (TrustBus 04), Lecture Notes in Computer Science, Zaragoza,

Spain,

August 30 - September 3, 2004.

34. Dongwan Shin, Gail-Joon Ahn, and Prasad Shenoy. Ensuring Information Assurance in

Fed-

erated Identity Management, In Proceedings of the 23rd IEEE International Performance

Com-

puting and Communications Conference (IPCCC 04), Phoenix, Arizona, April 14-17, 2004.

35. Prasad Shenoy, Dongwan Shin, and Gail-Joon Ahn. Towards Security-Aware Web Services

for Federated Identity Management, In Proceedings of the IASTED International Conference

on

Communication, Network, and Information Security (CNIS 03), New York City, December 10-

12,

2003.

36. Gail-Joon Ahn, Longhua Zhang, Dongwan Shin, and Bill Chu. Authorization Management

for

Role-based Collaboration, In Proceedings of IEEE International Conference on System, Man

and

Cybernetic (SMC 03), Washington, D.C., October 5-8, 2003.

37. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, and Seunghun Jin. On Modeling System-

centric

Information for Role Engineering, In Proceedings of 8th ACM Symposium on Access Control

Models and Technologies (SACMAT 03), Villa Gallia, Como, Italy, June 2-3, 2003.

38. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, and Seunghun Jin. A Role Administration

Sys-

tem in Role-based Authorization Infrastructures - Design and Implementation, In

Proceedings of

18th ACM Symposium on Applied Computing (SAC 03) in Special Track on Computer Security,

Melbourne, Florida, USA, March 9-12, 2003.

39. Dongwan Shin, Gail-Joon Ahn, and Joon S. Park. An application of DSML for RBAC, In

Proceedings of 26th IEEE Annual International Computer Software and Application

Conference

(CompSec 02), Oxford, England, August 26-29, 2002.

40. Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. Role-based EAM Using X.509 Attribute

Certificate, In Proceedings of 16th Annual IFIP WG 11.3 Working Conference on Data and

Application Security (DBSec 02), King s College, University of Cambridge, UK, July 29-31,

2002.

41. Gail-Joon Ahn and Dongwan Shin. Towards Scalable Authentication in Health Services,

In

Proceedings of 7th IEEE International Workshop on Enterprise Security (WETICE 02), CMU,

PA, June 10-12, 2002.

5

4.3 Poster and Work-in-progress

42. William Claycomb and Dongwan Shin. Designing and Implementing Access Control for Im-

promptu Collaboration, In Annual Computer Security Application Conference (ACSAC 06),

Works-in-Progress, Miami Beach, Florida, December 11-15, 2006.

4.4 Miscellaneous Technical Publications

43. Rodrigo Lopes and Dongwan Shin. Towards Secure Infrastructure Management System

Devel-

opment, Technical Report, SIS-Fall-07-01, New Mexico Tech, September 2007. Also

submitted

to Sandia National Laboratories.

44. Prasad Shenoy, Badrinath Mohan, Uttam Sankhala, Dongwan Shin, and Gail-Joon Ahn. Com-

parative Study of Microsoft .NET Passport and Liberty Alliance, Technical Report, LIISP-

Fall-

03-01, UNC Charlotte, August 2003. Also submitted to Bank of America (copyrighted

material).

45. Dongwan Shin and Gail-Joon Ahn. Engineering Role-based Infrastructure Management Sys-

tem, Technical Report, LIISP-Spring-03-01, UNC Charlotte, May 2003. Also submitted to

Elec-

tronics and Telecommunications Research Institute (ETRI).

46. Dongwan Shin, Gail-Joon Ahn, and Zhaoyu Liu. On Email Spoofing and Web Spoofing,

Technical Report, LIISP-Summer-02-01, UNC Charlotte, July 2002. Also submitted to Bank of

America.

47. Dongwan Shin, Gail-Joon Ahn, and Sangrae Cho. Role-based Access Control on Privilege

Management Infrastructure, Technical Report, LIISP-Spring-02-01, UNC Charlotte, May

2002.

Also submitted to Electronics and Telecommunications Research Institute (ETRI).

5 PROFESSIONAL ACTIVITIES

5.1 Journal Editorial Board

International Journal of Secure Software Engineering (IJSSE)

{ Reviewer Board, 2009

5.2 Conference Committee

Organizing Committee

{ Publication Chair, ACM Symposium on Applied Computing (SAC 09-11)

{ Publicity Chair, ACM Symposium on Access Control Models & Technologies (SACMAT 10)

{ Workshop co-Chair, IEEE International Workshop on Trusted Collaboration (TrustCol 09-

10)

{ Workshop co-Chair, IEEE International Workshop on Emerging Applications for Cloud Com-

puting (CloudApp 10)

Program Committee

{ IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 09)

{ International World Wide Web Conference - Security and Privacy Track (WWW 09)

{ ACM Symposium on Access Control Models and Technologies (SACMAT 06-10)

{ IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 07-09)

{ International workshop on Software Engineering for Secure Systems (SESS 08-09)

6

ARIEL:

Advanced Security Policy Engineering Framework for Distributed and Critical

Systems,

Sandia Labs, Albuquerque, New Mexico, 2/29/2008

Enabling Delegation for Impromptu Collaboration in Pervasive Computing Environments,

ISCIS

07, Turkey, 11/9/2007

A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing, TrustCol

06,

Atlanta, 11/17/2006.

Modeling Role-Based Trust and Authority in Open Environments, SAM 06, Las Vegas,

6/26/06.

Enabling Mobility in Enterprise Security Management, WIA 06, Phoenix, Arizona, 4/12/2006.

Securing Spontaneous Communications in Wireless Pervasive Computing Environments,

Workshop

on Security and Pervasive Multimedia Environments (MultiSec05) held in conjunction with

the 7th

IEEE ISM, 12/2005.

Panel Moderator at Information Technology Forum at NMT, Socorro, New Mexico Tech,

05/2005.

Access Control and Trust Management, Army Research Lab-New Mexico Tech Symposium at White

Sand Missle Range (WSMR), 04/2005.

Ensuring Information Assurance in Federated Identity Management, Workshop on Information

Assurance (WIA04) held in conjunction with the 23rd IEEE IPCCC, 04/2004.

Towards IA-Aware Web Services for Federated Identity Management, IASTED International Con-

ference on Communication, Network, and Information Security (CNIS 2003), 12/2003.

A Role-based Infrastructure Management System, Electronics and Telecommunications

Research

Institute, South Korea, 05/2003.

The RolePartner: A Role-based Infrastructure Management System, 18th ACM Symposium on

Applied Computing, 03/2003.

Remote NT System Intrusion and Its Countermeasures, ACM Student Chapter at UNC Charlotte,

12/2000.

8

5.6 Departmental Services

Led efforts to prepare for NM Tech CS Department s application for a Center of Academic

Ex-

cellence in Information Assurance Research (CAE-R) sponsored by National Security Agency

(NSA) and Department of Defense (DoD). NM Tech has been a CAE-IAE (Education) since

2002. Application was submitted on 1/15/2009. Certified on 6/1/2009 (till 2014).

Led efforts (course development and mapping) to prepare for NM Tech CS Department s ap-

plication for national information assurance (IA) certification programs (CNSS 4013:

System

Administrators, CNSS 4016: Audit Analysts) managed by National Security Agency (NSA).

{ CNSS 4013: application submitted on 1/15/2007 and certified on 6/5/2007 (till 2012)

Primary courses mapped : Access Control and System Security, Cryptography

{ CNSS 4016: application submitted on 1/15/2008 and certified on 6/4/2008 (till 2013)

Primary courses mapped : Secure Software Construction

Participated in NM Tech CS Department s efforts to get its program ABET-accredited.

Application

was submitted in 2007 summer. Accredited in 2007.

6 TEACHING ACTIVITIES

6.1 University Teaching at New Mexico Tech

1

Spring 2010

- CS589: Access Control and System Security (co-instruct with Dr. Fu, 10 CS students)

- CS326/IT326: Software Engineering (undergraduate class, 28 CS/IT students)

Fall 2009

- CS589: Virtualization Technologies (co-instruct with Dr. Fu, 11 CS students)

- CS389/IT321: Internet and Web Programming (undergraduate class, 16 CS/IT students)

Spring 2009

- CS589: Cloud Computing and Application* (graduate class, 11 CS students)

- CS326/IT326: Software Engineering (undergraduate class, 28 CS/IT students)

Fall 2008

- CS589/CS441/IT441: Cryptography and Application (graduate/senior class, 18 CS/IT

students)

- CS328/IT328: Secure Software Construction (undergraduate class, 17 CS/IT students)

Spring 2008

- CS589: Access Control and System Security (graduate class, 10 CS students)

- CS326/IT326: Software Engineering (undergraduate class, 31 CS/IT students)

Fall 2007

- CS589/CS441/IT441: Cryptography and Application (graduate/senior class, 16 CS/IT

students)

+

- CS328/IT328: Secure Software Construction (undergraduate class, 23 CS/IT students)

Spring 2007

- CS589: Advanced Computer Security* (graduate class, 10 CS students)

- CS326/IT326: Software Engineering* (undergraduate class, 31 CS/IT students)

Fall 2006

- CS589/CS441/IT441: Cryptography and Application (graduate/senior class, 21 CS/IT

students)

- IT321/CS391: Internet and Web Programming* (undergraduate class, 18 CS/IT students)

1

New course development and existing course enhancement 9

Spring 2006

- CS589: Access Control and System Security* (graduate class, 9 CS students)

- CS222: Systems Programming (undergraduate class, 30 CS/IT students)

Fall 2005

+

- CS441/IT441: Cryptography and Applications (undergraduate class, 44 CS/IT students)

Spring 2005

- CS391/IT222: Internet Programming (undergraduate class, 17 CS/IT students)

6.2 Student Advising at New Mexico Tech

Doctoral Students

- Rodrigo Lopes (since Fall 2008)

- Hakan Akkan (since Spring 2010)

- William R. Claycomb (graduated in 2009, currently MTS at Sandia Labs)

Master Students

- Hakan Akkan (graduated in 2009) - Rodrigo Lopes (graduated in 2008)

- William R. Claycomb (graduated in 2005)

Doctoral Students whose committee I have served on

- Lonny Montoya

- Earl Eiland

- Danny Quist (Graduated in 2010)

- Majed Abusafiya (Graduated in 2008)

- Mohammed Alghamdi (Graduated in 2008)

- Gopalakrishna R Tadiparthi (Graduated in 2008)

- Anthonius Sulaiman (Graduated in 2007)

- Qingzhong Liu (Graduated in 2007)

- Srinivas Mukkamala (Graduated in 2005)

Master Students whose committee I have served on

- Victor T.E. Echeverria

- Nico Marrero (Graduated)

- Derek Smith (Graduated)

- Mengyu Qiao (Graduated)

- Sherry Thomas (Graduated)

- Aaron Torres (Graduated)

- James Curry (Graduated)

- Hari Paruchuri (Graduated)

- Direndra Jayakumar (Graduated)

- Moses Schwartz (Graduated)

- Mayuri Shakamuri (Graduated)

- Ronald Prine (Graduated)

- David Burton (Graduated)

- Paul Ferrell (Graduated)

- Piyush Srivastava (Graduated)

- Unnati Thakore (Graduated)

- Tanya Montoya (Graduated)

- Sayi J. Yendrapalli (Graduated)

- Carl Thomsen (Graduated)

- Kiranmai Bellam (Graduated)

- Heather Bitsoi (Graduated)

10

- Jianhua Zhou (Graduated)

- Karthikeyan Ramamoorthy (Graduated)

7 PROFESSIONAL CERTIFICATES/MEMBERSHIPS

Microsoft Certified Systems Engineer (MCSE) on Window NT Track, Microsoft, 1999.

ACM, ACM SIGSAC, ACM SIGAPP

IEEE, IEEE Computer Society

8 HONORS AND AWARDS

Academic-Year Ambassadorial Scholarship ($21,000), Rotary International (1996 - 97).

Merit-based Scholarship (Best Entrance Exam Category - 305/340 and above): full tuition

waiver

& stipend (monthly W 620,000 4 yrs.), Hongik University (1988-90, 1993-95).

9 REFERENCES

Available upon request.

11



Contact this candidate