Tanveer Mustafa
Tanveer Mustafa
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Enforcing role-based access control policies in web services with UML and OCL
K Sohr, T Mustafa, X Bao, GJ Ahn
2008 Annual Computer Security Applications Conference (ACSAC), 257-266, 2008
Software security aspects of Java-based mobile phones
K Sohr, T Mustafa, A Nowak
Proceedings of the 2011 ACM Symposium on Applied Computing, 1494-1501, 2011
Understanding the implemented access control policy of Android system services with slicing and extended static checking
T Mustafa, K Sohr
International Journal of Information Security 14 (4), 347-366, 2015
Secure mobile business information processing
N Kuntze, R Rieke, G Diederich, R Sethmann, K Sohr, T Mustafa, ...
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
Implementing advanced RBAC administration functionality with USE
T Mustafa, K Sohr, DH Dang, M Drouineaud, S Kowski
Electronic Communications of the EASST 15, 2008
Towards formal specification and verification of a role-based authorization engine using jml
T Mustafa, M Drouineaud, K Sohr
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
Towards security program comprehension with design by contract and slicing
K Sohr, T Mustafa, M Gulmann, P Gerken
Technical Report TZI-Bericht-2016-80, Universität Bremen, Germany, 2016
Towards Formal Specification and Verification of a Role-Based Authorization Engine using JML [Position paper]
T Mustafa, M Drouineaud, K Sohr
Static Security Analysis of Java Applications with an Approach Based on Design by Contract
T Mustafa
8 th International Workshop on OCL Concepts and Tools (OCL 2008) at MoDELS 2008
T Mustafa, K Sohr, DH Dang, M Drouineaud, S Kowski
Electronic Communications of the EASST 15, 2008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10