Research Output per year

## Research Output 1983 2016

## Certified Security by Design for the Internet of Things

Chin, S. K., Nov 7 2016,*Cyber Assurance for the Internet of Things.*Wiley Blackwell, p. 1-99 99 p.

Research output: Chapter in Book/Report/Conference proceeding › Chapter

## Reliability analysis of healthcare information systems: State of the art and future directions

Gawanmeh, A., Al-Hamadi, H., Al-Qutayri, M., Chin, S. K. & Saleem, K., Apr 15 2016,*2015 17th International Conference on E-Health Networking, Application and Services, HealthCom 2015.*Institute of Electrical and Electronics Engineers Inc., p. 68-74 7 p. 7454475

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Banking on interoperability: Secure, interoperable credential management

Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S. B., Jul 4 2014, In : Computer Networks. 67, p. 235-251 17 p.Research output: Contribution to journal › Article

## Reasoning about delegation and account access in retail payment systems

Chin, S. K. & Older, S. B., 2013,*Communications in Computer and Information Science.*PART II ed. Vol. 374. p. 99-114 16 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Engineering Assurance at the Undergraduate Level

Irvine, C., Yasinsac, A., Older, S. B. & Chin, S. K., 2012, In : IEEE Security and Privacy. 10, 6, p. 74-77 4 p.Research output: Contribution to journal › Article

## Access control, security, and trust: A logical approach

Chin, S. K. & Older, S. B., Jan 1 2010, CRC Press. 325 p.Research output: Book/Report › Book

## Credentials management for high-value transactions

Benson, G., Chin, S. K., Croston, S., Jayaraman, K. & Older, S. B., 2010,*Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).*Vol. 6258 LNCS. p. 169-182 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Policy-based design and verification for mission assurance

Chin, S. K., Muccio, S., Older, S. B. & Vestal, T. N. J., 2010,*Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).*Vol. 6258 LNCS. p. 125-138 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6258 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Reasoning about delegation and Account access in retail payment systems

Chin, S. K. & Older, S. B., 2007,*Communications in Computer and Information Science.*Vol. 1. p. 99-114 16 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A modal logic for role-based access control

Kosiyatrakul, T., Older, S. B. & Chin, S. K., 2005,*Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).*Vol. 3685 LNCS. p. 179-193 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3685 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Implementing a calculus for distributed access control in higher order logic and HOL

Kosiyatrakul, T., Older, S. B., Humenn, P. & Chin, S. K., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2776, p. 32-46 15 p.Research output: Contribution to journal › Article

## Outcomes-based assessment as an assurance education tool

Older, S. B. & Chin, S. K., 2003,*IFIP Advances in Information and Communication Technology.*Springer New York LLC, Vol. 125. p. 179-196 18 p. (IFIP Advances in Information and Communication Technology; vol. 125).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal methods for assuring security of protocols

Older, S. B. & Chin, S. K., 2002, In : Computer Journal. 45, 1, p. 46-54 9 p.Research output: Contribution to journal › Article

## Formal analysis of a secure communication channel: Secure core-email protocol

Zhou, D. & Chin, S. K., 1999,Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal development of secure Email

Zhou, D., Kuo, J. C., Older, S. B. & Chin, S. K., 1999,*Proceedings of the Hawaii International Conference on System Sciences.*IEEE Computer Society, p. 132 1 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal verification of tree-structured carry-lookahead adders

Kim, S. H. & Chin, S. K., 1999,*Proceedings of the IEEE Great Lakes Symposium on VLSI.*IEEE Computer Society, p. 232-233 2 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## High-Confidence Design for Security

Chin, S. K., 1999, In : Communications of the ACM. 42, 7, p. 33-37 5 p.Research output: Contribution to journal › Article

## An instruction set process calculus

Chin, S. K. & Kim, J. D., 1998,Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Integrating security into the curriculum

Irvine, C. E., Chin, S. K. & Frincke, D., Dec 1998, In : Computer. 31, 12, p. 25-30 6 p.Research output: Contribution to journal › Article

## Assured VLSI design with formal verification

Kim, J. D. & Chin, S. K., 1997,*COMPASS - Proceedings of the Annual Conference on Computer Assurance.*Anon (ed.). IEEE Computer Society, p. 13-22 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Experience extending VLSI design with mathematical logic

Chin, S. K., 1997,*Proceedings of the IEEE International Conference on Microelectronic Systems Education, MSE.*IEEE Computer Society, p. 11-12 2 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal methods applied to secure network engineering

Chin, S. K., Faust, J. & Giordano, J., 1996,*Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS.*IEEE Computer Society, p. 344-351 8 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal specification and verification of the kernel functional unit of the OSI session layer protocol and service using CCS

Barjaktarović, M., Chin, S. K. & Jabbour, K., May 1 1996,*Proceedings of the 1996 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 1996.*Association for Computing Machinery, Inc, p. 270-279 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Hardware composition with hardware flowcharts and process algebras

Lu, J. Y. J., Kim, J. D. & Chin, S. K., 1996,*Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS.*IEEE Computer Society, p. 352-364 13 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Extending VLSI design with higher-order logic

Chavan, A., Chin, S. K. & Lu, J. Y., 1995,*Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors.*Anon (ed.). IEEE Computer Society, p. 85-94 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal specification and verification of communication protocols using automated tools

Barjaktarovic, M., Chin, S. K. & Jabbour, K., 1995,*Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS.*IEEE Computer Society, p. 246-253 8 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal verification of serial pipeline multipliers

Kim, J. D. & Chin, S. K., 1995,Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Integrating formal methods tools to support system design

Chin, S. K., Faust, J. & Giordano, J., 1995,*Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS.*IEEE Computer Society, p. 88-95 8 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Generating designs using an algorithmic register transfer language with formal semantics

Lu, J. Y. & Chin, S. K., 1994,*Higher Order Logic Theorem Proving and Its Applications - 7th International Workshop, Proceedings.*Springer Verlag, Vol. 859 LNCS. p. 316-331 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 859 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Linking higher order logic to a VLSI CAD system

Lu, J. Y. & Chin, S. K., 1994,*Higher Order Logic Theorem Proving and Its Applications - 6th International Workshop, HUG 1993, Proceedings.*Springer Verlag, Vol. 780 LNCS. p. 199-212 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 780 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Parallel implementation of BDD algorithms using a distributed shared memory

Parasuram, Y., Stabler, E. & Chin, S. K., 1994,*Proceedings of the Hawaii International Conference on System Sciences.*Nunamaker, J. F. & Sprague, R. H. J. (eds.). IEEE Computer Society, Vol. 1. p. 16-25 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Server-process restrictiveness in HOL

Brackin, S. H. & Chin, S. K., 1994,*Higher Order Logic Theorem Proving and Its Applications - 6th International Workshop, HUG 1993, Proceedings.*Springer Verlag, Vol. 780 LNCS. p. 450-463 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 780 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Formal specification and verification of OSI session layer protocol using CCS

Barjaktarovic, M., Chin, S. K. & Jabbour, K., 1993,*Midwest Symposium on Circuits and Systems.*IEEE Computer Society, Vol. 2. p. 1140-1143 4 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Implementing and verifying finite-state machines using types in higher-order logic

Chin, S. K. & Birtwistle, G., Jan 1 1991,*Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and Its Applications.*Windley, P. J., Joyce, J. J., Levitt, K. N. & Archer, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 121-129 9 p. 596279. (Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and Its Applications).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Verifying arithmetic hardware in higher-order logic

Chin, S. K., Jan 1 1991,*Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and Its Applications.*Windley, P. J., Joyce, J. J., Levitt, K. N. & Archer, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 22-31 10 p. 596268. (Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and Its Applications).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Combining engineering vigor with mathematical rigor

Chin, S. K., 1990,*Hardware Specification, Verification and Synthesis: Mathematical Aspects - Mathematical Sciences Institute Workshop, Proceedings.*Springer Verlag, Vol. 408 LNCS. p. 152-176 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 408 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Synthesis of arithmetic hardware using hardware metafunctions

Chin, S. K. & Stabler, E. P., Aug 1990, In : IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 9, 8, p. 793-803 11 p.Research output: Contribution to journal › Article

## Using higher order logic and functional languages to synthesize correct hardware

Chin, S. K., Stabler, E. P. & Greene, K. J., 1988,*Int Conf on Comput Lang 1988 Proc.*IEEE Computer Society, p. 396-403 8 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Verifiable and executable theories of design for synthesizing correct hardware

Chin, S. K. & Greene, K. J., 1988,*1988 IEEE Int Conf Comput Des VLSI Comput Process ICCD 88 Proc.*IEEE Computer Society, p. 604-610 7 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## SYNTHESIS OF DIGITAL DESIGNS BY EQUIVALENCE TRANSFORMATIONS.

Chin, S. K. & Stabler, E. P., 1986,*Unknown Host Publication Title.*IEEE Computer Society, p. 558-560 3 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## HIGHLY DENSE VLSI COMPLEX ARRAY MULTIPLIER.

Shay, H., Gray, D. & Chin, S. K., 1983,*Proceedings of the Custom Integrated Circuits Conference.*IEEE Computer Society, p. 249-251 3 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution