Khaled M. Khan
According to our database1, Khaled M. Khan authored at least 59 papers between 1994 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Systematic identification of threats in the cloud: A survey.
Computer Networks, 2019
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Computers & Security, 2018
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Data confidentiality in cloud-based pervasive system.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming.
Int. J. Cooperative Inf. Syst., 2016
Garbled computation in cloud.
Future Generation Comp. Syst., 2016
Using Block Cipher for Confidentiality of Images in Cloud-Based Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self-Adaptive Systems, 2015
A Process Model for Customisation of Software in Multi-tenant SaaS Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Data Obfuscation for Privacy and Confidentiality in Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014
Empowering users of cloud computing on data confidentiality.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014
Reasoning about Security Policies of Services Using Answer Set Programming.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
Addressing security compatibility for multi-tenant cloud services.
Role of contextual properties in enterprise service migration to cloud computing.
Concurrency and Computation: Practice and Experience, 2013
Trust in Cloud Services: Providing More Controls to Clients.
IEEE Computer, 2013
Social access control language (SocACL).
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Automatic verification of health regulatory compliance in cloud computing.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Secure Cloud Services: Matrix Multiplication Revisited.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Software Security Engineering: Design and Applications.
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012
Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012
Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Ell Secure Information System Using Modal Logic Technique.
Profile-Based Security Assurances for Service Software.
Proceedings of the Exploring Services Science - Second International Conference, 2011
Identifying Contextual Properties of Software Architecture in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
A Modal Logic for Information System Security.
Proceedings of the Ninth Australasian Information Security Conference, 2011
Establishing Trust in Cloud Computing.
IT Professional, 2010
A Tool Support for Secure Software Integration.
Security-Aware Service Composition for End Users of Small Enterprises.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010
SecCom: A Prototype for Integrating Security-Aware Components.
Proceedings of the Information Systems: Modeling, 2009
Knowledge-Based Algorithms to Optimise e-Learning Outcome.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Specifying Security Goals of Component Based Systems: An End-User Perspective.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008
Assessing quality of web based systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
Selecting Web Services with Security Compliances: A Managerial Perspective.
Proceedings of the Pacific Asia Conference on Information Systems, 2007
Assessing Security Properties of Software Components: A Software Engineer's Perspective.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006
Security-Oriented Service Composition and Evolution.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006
Deriving Systems Level Security Properties of Component Based Composite Systems.
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005
Evolution of Software Security - A Must.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
A framework for transforming artifacts from data flow diagrams to UML.
Proceedings of the IASTED International Conference on Software Engineering, 2004
A Process Framework for Characterising Security Properties of Component-Based Software Systems.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004
Incorporating Business Requirements and Constraints in Database Conceptual Model.
Proceedings of the Conceptual Modelling 2004, 2004
A Security Characterisation Framework for Trustworthy Component Based Software Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
Composing Security-Aware Software.
IEEE Software, 2002
Types of software evolution and software maintenance.
Journal of Software Maintenance, 2001
Tasks and Methods for Software Maintenance: a process oriented framework.
Australasian J. of Inf. Systems, 2001
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001
Security Characterization of Software Components and Their Composition.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000
Characterizing User Data Protection of Software Components.
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000
Security Properties of Software Components.
Proceedings of the Information Security, Second International Workshop, 1999
Adoption versus abandonment of CASE tools: lessons from two organizations.
IT & People, 1997
Assessment Model for Software Maintenance Tools: A Conceptual Framework.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
Advantages of Using Prototypes in a Multi-Layer Perceptron and Comparison to Other Neural Networks.