Research Information


Table of Contents

·         Research Interests

·         Book

·         Sample Papers

·         Formal Methods Research Group

 

home


Research Interests

·         My research focuses on applying mathematical logic to access control and verification.

·         I work with Air Force Research Laboratory Information Directorate in Rome, New York.

top


Books

·         Shiu-Kai Chin and Susan Older, Access Control, Security, and Trust: A Logical Approach, CRC Press, 2011.

·         new_theory `HOL`;; An Introduction to Hardware Verification in Higher Order Logic, Graham Birtwistle, Shiu-Kai Chin, Brian Graham.

top
 


Sample Papers

·         Tyson Brooks, Shiu-Kai Chin, Erich Devendorf, and William Young, Systems Security Engineering for Mission Assurance: System-Theoretic and Technical Operational Risk Management (STORM). Technical Report. 2018

·         Shiu-Kai Chin, Certified Security by Design for the Internet of Things, Technical Report. This report is a draft version of Chapter 1: Certified Security by Design for the Internet of Things, pp. 3-99, Cyber Assurance for the Internet of Things, Tyson T. Brooks (ed), Wiley-IEEE Press, 2017.

·         Shiu-Kai Chin, “Teaching Undergraduates Certified Security by Design,” 19th Colloquium for Information Systems Security Education, Las Vegas, NV, June 15-17, 2015.

·         Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older, “Banking on interoperability: Secure, interoperable credential management,” Computer Networks, 67, 2014, pp. 235 – 251.

·         Susan Older and Shiu-Kai Chin, “Engineering Assurance at the Undergraduate Level,” IEEE Security and Policy, Volume 10, No. 6, November/December 2012

·         Shiu-Kai Chin, Erich Devendorf, Sarah Muccio, Susan Older, and James Royer, “Formal Verification for Mission Assurance in Cyberspace: Education, Tools, and Results,” Proceedings of the 16th Colloquium for Information Systems Security Education, Lake Buena Vista, FL, June 11-13, 2012, pp. 75—82.

·         (Note: this paper is part of the same program as we describe above but I am not a co-author). Erich Devendorf, Sarah Muccio, Fred Wieners, “Developing the Next Generation of Cyber Leaders,” Proceedings of the 16th Colloquium for Information Systems Security Education, Lake Buena Vista, FL, June 11-13, 2012, pp. 34—41.

·         Shiu-Kai Chin, Sarah Muccio, Susan Older, and Thomas N. J. Vestal, “Policy-Based Design and Verification for Mission Assurance,” in Igor Kotenko and Victor Skormin (Eds.), Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 2010.

·         Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, and Susan Older, “Credentials Management for High-Value Transactions,” in Igor Kotenko and Victor Skormin (Eds.), Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 2010.

·         Shiu-Kai Chin and Susan Older, “A Logical Approach to Access Control, Security, and Trust,” Indo-US Conference and Workshop on Cyber Security, Cyber Crime, and Cyber Forensics, August 19-21, 2009, Kochi, India.

·         Shiu-Kai Chin and Susan Older, “Educating Engineers to Design Trustworthy Systems,” Indo-US Conference and Workshop on Cyber Security, Cyber Crime, and Cyber Forensics, August 19-21, 2009, Kochi, India.

·         Shiu-Kai Chin and Susan Older, “Reasoning About Delegation and Account Access in Retail Payment Systems,” in V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): Mathematical Methods, Models, and Architectures for Computer Network Security 2007, Communications in Computer and Information Science, Volume 1, pp. 99–114, 2007. Springer-Verlag, Berlin Heidelberg,  2007.

·         Shiu-Kai Chin, The Logic of Engaging the Democratic People’s Republic of Korea: Principles, Practice, and Experience, U.S. Civilian Research & Development Foundation Workshop on U.S.-North Korea Based Scientific Collaboration, Civilian Research and Development Foundation, Arlington, VA, May 22, 2007.

·         Shiu-Kai Chin and Susan Older, A Rigorous Approach to Teaching Access Control, Annual Conference on Education in Information Security (ACEIS) 2006, September 18-19, 2006,

·         Thumrongsak Kosiyatrakul, Susan Older, and Shiu-Kai Chin, A Modal Logic for Role-Based Access Control, Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, Lecture Notes in Computer Science, Volume 3685, 2005.

·         Shiu-Kai Chin, Polar Humenn, Thumrongsak Kosiyatrakul, Terrell Northrup, Susan Older, and Stuart Thorson, A Trusted Information Sharing Project, (invited paper), Workshop on Secure Knowledge Management, September 23-24, 2004,  Amherst, NY.

·         Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, and Shiu-Kai Chin, Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL, (invited paper), Computer Network Security: Second International Workshop on      Mathematical Methods, Models, and Architectures for Computer Network Security, edited by V. Gorodetsky, L. Popyack, and V. Skormin, Lecture Notes in Computer Science, Volume 2776, 2003.

·         Susan Older, Shiu-Kai Chin. Building a Rigorous Foundation for Assurance into Information Assurance Education. Volume 1, Number 2 of the George Washington University Journal of Information Security.

·         Formal Methods for Assuring Security of Protocols, Susan Older and Shiu-Kai Chin, The Computer Journal, Vol. 45, No. 1, 2002

·         Formal Verification of Authentication Protocols that Use the X.509 Standard for Public Key Distribution, Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin,  International Joint Conference on Automated Reasoning (IJCAR) June 18 - June 23, 2001 in Siena, Italy

·         Embedding Algebraic Specifications in HOL. Presented at TPHOLs99, The 12th International Conference on Theorem Proving in Higher Order Logics, Nice, France, September 14-17, 1999

·         Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol. Presented at FM'99 World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999.

·         High Confidence Design for Security, Communications of the ACM, July 1999.

·         Formal Development of Secure Email. Presented in the Hawaii International Conference on System Sciences, Techniques for Secure Systems Development, Island of Maui, January 5 - 8, 1999.

·         Integrating Security into the Curriculum, IEEE Computer, December 1998.

·         An Instruction-Set Process Calculus. Presented in the Formal Methods in Computer Aided Design Conference (FMCAD98), November 4-6, 1998, Palo Alto, CA. HOL90 proof files for IspCal.

·         Highly Assured Computer Engineering. Position paper presented to National Research Council's sub-committee on Information Trustworthiness. February 5-6, 1997.

·         High Confidence Technology . White paper responding to the Committee on Information and Communications, National Science and Technology Council, Strategic Information Plan, America in the Age of Information.

·         Extending VLSI Design with Higher-Order Logic, presented at ICCD'95.

top


Updated: 28 June 2015