The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Khaled M. Khan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Khaled M. Khan, Mahesha Kapurubandara, Urvashi Chadha
    Incorporating Business Requirements and Constraints in Database Conceptual Model. [Citation Graph (0, 0)][DBLP]
    APCCM, 2004, pp:59-64 [Conf]
  2. Khaled M. Khan, Jun Han
    A Process Framework for Characterising Security Properties of Component-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2004, pp:358-367 [Conf]
  3. Khaled M. Khan, Jun Han
    Deriving Systems Level Security Properties of Component Based Composite Systems. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2005, pp:334-343 [Conf]
  4. Khaled M. Khan, Jun Han
    Assessing Security Properties of Software Components: A Software Engineer's Perspective. [Citation Graph (0, 0)][DBLP]
    ASWEC, 2006, pp:199-210 [Conf]
  5. Khaled M. Khan, Jun Han, Yuliang Zheng
    Characterizing User Data Protection of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2000, pp:3-12 [Conf]
  6. Khaled M. Khan, Jun Han, Yuliang Zheng
    A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2001, pp:117-126 [Conf]
  7. Khaled M. Khan, Jun Han
    A Security Characterisation Framework for Trustworthy Component Based Software Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:164-169 [Conf]
  8. Thu Nga Tran, Khaled M. Khan, Yi-Chen Lan
    A framework for transforming artifacts from data flow diagrams to UML. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:123-128 [Conf]
  9. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Properties of Software Components. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:52-56 [Conf]
  10. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Characterization of Software Components and Their Composition. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:240-249 [Conf]
  11. Khaled M. Khan, Jun Han
    Composing Security-Aware Software. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:1, pp:34-41 [Journal]

  12. Assessing quality of web based systems. [Citation Graph (, )][DBLP]


  13. Security-Oriented Service Composition and Evolution. [Citation Graph (, )][DBLP]


  14. Specifying Security Goals of Component Based Systems: An End-User Perspective. [Citation Graph (, )][DBLP]


  15. SecCom: A Prototype for Integrating Security-Aware Components. [Citation Graph (, )][DBLP]


Search in 0.054secs, Finished in 0.055secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002