Khaled M. Khan

According to our database1, Khaled M. Khan
  • authored at least 54 papers between 1994 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming.
Int. J. Cooperative Inf. Syst., 2016

Garbled computation in cloud.
Future Generation Comp. Syst., 2016

Using Block Cipher for Confidentiality of Images in Cloud-Based Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self-Adaptive Systems, 2015

A Process Model for Customisation of Software in Multi-tenant SaaS Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Data Obfuscation for Privacy and Confidentiality in Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

Empowering users of cloud computing on data confidentiality.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

Reasoning about Security Policies of Services Using Answer Set Programming.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Addressing security compatibility for multi-tenant cloud services.
IJCAT, 2013

Role of contextual properties in enterprise service migration to cloud computing.
Concurrency and Computation: Practice and Experience, 2013

Trust in Cloud Services: Providing More Controls to Clients.
IEEE Computer, 2013

Social access control language (SocACL).
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Automatic verification of health regulatory compliance in cloud computing.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Secure Cloud Services: Matrix Multiplication Revisited.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Software Security Engineering: Design and Applications.
IJSSE, 2012

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Ell Secure Information System Using Modal Logic Technique.
IJSSE, 2011

Profile-Based Security Assurances for Service Software.
Proceedings of the Exploring Services Science - Second International Conference, 2011

Identifying Contextual Properties of Software Architecture in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Modal Logic for Information System Security.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Establishing Trust in Cloud Computing.
IT Professional, 2010

A Tool Support for Secure Software Integration.
IJSSE, 2010

Security-Aware Service Composition for End Users of Small Enterprises.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

2009
SecCom: A Prototype for Integrating Security-Aware Components.
Proceedings of the Information Systems: Modeling, 2009

Knowledge-Based Algorithms to Optimise e-Learning Outcome.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

2008
Wireless Networks.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Specifying Security Goals of Component Based Systems: An End-User Perspective.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

Assessing quality of web based systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Selecting Web Services with Security Compliances: A Managerial Perspective.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

2006
Assessing Security Properties of Software Components: A Software Engineer's Perspective.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Security-Oriented Service Composition and Evolution.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

2005
Deriving Systems Level Security Properties of Component Based Composite Systems.
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005

2004
Evolution of Software Security - A Must.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

A framework for transforming artifacts from data flow diagrams to UML.
Proceedings of the IASTED International Conference on Software Engineering, 2004

A Process Framework for Characterising Security Properties of Component-Based Software Systems.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004

Incorporating Business Requirements and Constraints in Database Conceptual Model.
Proceedings of the Conceptual Modelling 2004, 2004

2003
A Security Characterisation Framework for Trustworthy Component Based Software Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Composing Security-Aware Software.
IEEE Software, 2002

2001
Types of software evolution and software maintenance.
Journal of Software Maintenance, 2001

Tasks and Methods for Software Maintenance: a process oriented framework.
Australasian J. of Inf. Systems, 2001

A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001

2000
Security Characterization of Software Components and Their Composition.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000

Characterizing User Data Protection of Software Components.
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000

1999
Security Properties of Software Components.
Proceedings of the Information Security, Second International Workshop, 1999

1997
Adoption versus abandonment of CASE tools: lessons from two organizations.
IT & People, 1997

Assessment Model for Software Maintenance Tools: A Conceptual Framework.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

1994
Advantages of Using Prototypes in a Multi-Layer Perceptron and Comparison to Other Neural Networks.
ECAI, 1994


  Loading...