Enforcing role-based access control policies in web services with UML and OCL K Sohr, T Mustafa, X Bao, GJ Ahn 2008 Annual Computer Security Applications Conference (ACSAC), 257-266, 2008 | 36 | 2008 |
Software security aspects of Java-based mobile phones K Sohr, T Mustafa, A Nowak Proceedings of the 2011 ACM Symposium on Applied Computing, 1494-1501, 2011 | 20 | 2011 |
Understanding the implemented access control policy of Android system services with slicing and extended static checking T Mustafa, K Sohr International Journal of Information Security 14, 347-366, 2015 | 16 | 2015 |
Secure mobile business information processing N Kuntze, R Rieke, G Diederich, R Sethmann, K Sohr, T Mustafa, ... 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 7 | 2010 |
Towards formal specification and verification of a role-based authorization engine using jml T Mustafa, M Drouineaud, K Sohr Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 5 | 2010 |
Implementing advanced RBAC administration functionality with USE T Mustafa, K Sohr, DH Dang, M Drouineaud, S Kowski Electronic Communications of the EASST 15, 2008 | 5 | 2008 |
Towards security program comprehension with design by contract and slicing K Sohr, T Mustafa, P Hirch, M Gulmann Technologie-Zentrum Informatik und Informationstechnik, 2016 | 3 | 2016 |
Towards formal specification and verification of a role-based authorization engine using jml (position paper) T Mustafa, M Drouineaud, K Sohr 5th ACM ICSE Workshop on Software Engineering for Secure Systems (SESS10 …, 2010 | 2 | 2010 |
Static Security Analysis of Java Applications with an Approach Based on Design by Contract T Mustafa | | 2013 |