1
2022
|
1
Amir,,''Identity Management System for Electronic Government Processes in Pakistan'',IEEE,2022.
|
2
2022
|
2
Munam Ahmer,,''Cryptanalysis of OAuth2.0 Protocol: A Divide and Conquer Approach '',CMC,2022.
|
3
2021
|
3
Abdul Basit,,''Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks'',IEEE,2021.
|
4
2021
|
4
Shafaq,,''k-NDDP: An Efficient Anonymization Model for Social Network Data Release'',Electronics,2021.
|
5
2021
|
5
Shahzad,,''). OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search'',IEEE,2021.
|
6
2021
|
6
Shawal,,''ABKS-PBM: Attribute-Based Keyword Search with Partial Bilinear Map'',IEEE,2021.
|
7
2019
|
7
Ahsan,,''FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network'',IEEE,2019.
|
8
2019
|
8
Sehrish,,''Privacy aware decentralized access control system. Future Generation Computer Systems.'',FGSC,2019.
|
9
2019
|
9
Sehrish,,''Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach'',IEEE,2019.
|
10
2019
|
10
T,,''Towards augmented proactive cyberthreat intelligence'',Science Direct,2019.
|
11
2019
|
11
U,,''Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions'',Computer Netwroks,2019.
|
12
2018
|
12
A,,''Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits'',Science Direct,2018.
|
13
2018
|
13
Masoom,,''Secure policy execution using reusable garbled circuit in the cloud'',Science Direct,2018.
|
14
2018
|
14
Masoom,,''Structures and Data Preserving Homomorphic Signatures in JNCA'',Science Direct,2018.
|
15
2018
|
15
Masoom,,''Garbled Role-Based Access Control in the Cloud, in Journal of Ambient Intelligence and Humanized Computing'',Springer,2018.
|
16
2018
|
16
S,,''Vector Based Genetic Algorithm to optimize predictive analysis in network security'',Applied Intelligence,2018.
|
17
2018
|
17
M,,''Privacy preservation in skewed data using frequency distribution and weightage (FDW).'',MIHI,2018.
|
18
2018
|
18
Masoom,,''Towards Preserving Privacy of Outsourced Genomic Data Over the Cloud accepted in Journal of Medical Imaging and Health Informatics'',Springer,2018.
|
19
2018
|
19
Masoom,,''Towards a Set Aggregation-Based Data Integrity Scheme for Smart Grids'',Springer,2018.
|
20
2018
|
20
Adeel,,''t-Safety: A Privacy Model for SequentialPublication with Arbitrary Updates'',Science Direct,2018.
|
21
2018
|
21
Adeel,,''t-Safety: A Privacy Model for SequentialPublication with Arbitrary Updates'',Science Direct,2018.
|
22
2018
|
22
Nazir,,''A High-Level Domain-specific language for SIEM (design, Development and Formal Verification)'',Springer,2018.
|
23
2018
|
23
Nighat,,''A Novel Internet of Thingscentric Framework to Mine Malicious Frequent Patterns,'',IEEE,2018.
|
24
2018
|
24
Quaratulain,,''Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification'',IEEE,2018.
|
25
2017
|
25
Faheem,,''survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends'',Science Direct,2017.
|
26
2017
|
26
Ashfaq,,''On energy efficiency in underwater wireless sensor networks with cooperative routing'',Springer,2017.
|
27
2017
|
27
Masoom,,''Optimizing SIEM Throughput on the Cloud Using Parallelization'',PLOS ONE,2017.
|
28
2017
|
28
Bisma,,''Formal Modeling and Verification of Security Controls for Multimedia Systems in the Cloud,"'',Springer,2017.
|
29
2017
|
29
Naeem,,''A balanced energy consuming and hole alleviating algorithm for wireless sensor networks'',IEEE,2017.
|
30
2017
|
30
Quaratulain,,''ormal verification of the xDAuth Protocol'',IEEE,2017.
|
31
2017
|
31
Ajaz,,''Scalable Visualization of Semantic Nets using Power-Law Graphs'',Natural Publishing,2017.
|
32
2017
|
32
Masoom,,''Behavioral Attestation for Web Services using access policies'',Springer,2017.
|
33
2017
|
33
Tamleem,,''Secure Actor Directed Localization in Wireless Sensor and Actor Networks (WSAN)'',SAGEUP,2017.
|
34
2016
|
34
Masoom,,''Dynamic Remote Attestation Through Behavior Measurement And Verification,'',Web Of Knowledge,2016.
|
35
2014
|
35
Masoom,,''Model-Driven Security For Trusted Systems'',IJIC,2014.
|
36
2013
|
36
Masoom,,''Analysis Of Existing Remote Attestation Techniques'',Online Liberary,2013.
|
37
2013
|
37
Masoom,,''Behavioral Attestation for Web Services Based Business Processes'',Web Of Knowledge,2013.
|
38
2012
|
38
Sajid,,''Architecture Based Software Quality Maintenance Ripple Effect Analysis'',Web Of Knowledge,2012.
|
39
2012
|
39
Quaratulain,,''Towards A Formal Framework for Cross Domain Access Control'',Web Of Knowledge,2012.
|
40
2012
|
40
Tamleek,,''Scalable and Privacy Preserving Remote Attestation Mechanism'',Web Of Knowledge,2012.
|
41
2012
|
41
M. Masoom Alam,Xinwen Zhang,Mohammad Nauman''DYNAMIC REMOTE ATTESTATION THROUGH BEHAVIOR MEASUREMENTAND VERIFICATION'',IJICIC,2012.
|
42
2012
|
42
M. Masoom Alam,Shahbaz Khan,Quratulain Alam''MODEL-DRIVEN SECURITY FOR TRUSTED SYSTEMS'',IJICIC,2012.
|
43
2012
|
43
Hammad Banuri,M. Masoom Alam,Shahryar Khan''An Android runtime security policy enforcement framework'',Springer,2012.
|
44
2012
|
44
Sajid Anwar,Awais Adnan,M.Masoom Alam''ARCHITECTURE BASED SOFTWARE QUALITY MAINTENANCE RIPPLE EFFECT ANALYSIS'',IJICIC,2012.
|
45
2011
|
45
M. Masoom Alam,Xinwen Zhang,Kamaran Khan''xDAuth: a scalable and lightweight framework for cross domain access control and delegation'',ACM,2011.
|
46
2011
|
46
M. Masoom Alam,M u h a m m a d A l i ,M u h a m m a d A l i 2''M a u t h : A f i n e - g r a i n e d a n d u s e r - c e n t r i c p e r m i s s i o n d e l e g a t i o n f r a m e w o r k f o r w e b s e r v i c e s'',IEEE,2011.
|
47
2011
|
47
M. Masoom Alam,Tamleek Ali,Sanaullah Khan''Analysis of existing remote attestation techniques'', Wiley Online Library ,2011.
|
48
2011
|
48
Masoom,,''XDAUTH: A SCALABLE AND LIGHTWEIGHT FRAMEWORK FOR CROSS-DOMAIN ACCESS CONTROL AND DELEGATION'',ACM,2011.
|
49
2011
|
49
Masoom,,''Towards Trusted Information Sharing in Enterprise Information Systems'',Web Of Knowledge,2011.
|
50
2011
|
50
Sajid,,''A Foda Oriented Approach To Architecture Based Ripple Effect Analysis,”'',Web Of Knowledge,2011.
|
51
2010
|
51
Hammad,,''ANDROID RUNTIME SECURITY POLICY ENFORCEMENT FRAMEWORK'',SMARTPHONE,2010.
|
52
2010
|
52
Masoom,,''Fine-grained, User-Centric Permission Delegation in Multi-Mashup Web Services'',SERVICES,2010.
|
53
2010
|
53
Tamleek Ali Tanveer,M. Masoom Alam,''Scalable, Privacy-preserving Remote Attestation in and through Federates Identity Management Frameworks'',ICISA,2010.
|
54
2010
|
54
Tamleek Ali Tanveer,Mohammad Nauman,Muhammad Amin''Scalable, privacy-preserving remote attestation in and through federated identity management frameworks'',IEEE,2010.
|
55
2010
|
55
M. Masoom Alam,Mohammad Nauman,Xinwen Zhang''Behavioral Attestation for Web Services Based Business Processes'',IGI Global,2010.
|
56
2010
|
56
M. Masoom Alam,Mohammad Nauman,Xinwen Zhang''Behavioral Attestation for Web Services Based Business Processes'',IGI Global,2010.
|
57
2009
|
57
M. Masoom Alam,Mohammad Nauman,Xinwen Zhang''Behavioral Attestation for Business Processes'',IEEE,2009.
|
58
2009
|
58
Mohammad Nauman,M. Masoom Alam,''Remote Attestation of Attribute Updates and information Flows in a UCON System'',Springer,2009.
|
59
2009
|
59
Shabaz Khan,,''Realizing dynamic Behavior Attestation for Mobile Platforms'',FIT/ACM,2009.
|
60
2009
|
60
Imran Khan,,M.Masoom Alam''SAuthMash: mobile agent based self authorization in Mashups'',FIT/ACM,2009.
|
61
2009
|
61
Tamleek Ali Tanveer,M. Masoom Alam,''Scalable Remote Attestation with Privacy Protection'',Springer,2009.
|
62
2009
|
62
Masoom,,''Behavior Attestation for Business Process'',IEEE,2009.
|
63
2009
|
63
Masoom ,,''Behavior Attestation for Business Process'',IEEE,2009.
|
64
2008
|
64
Masoom,,''Usage Control Platformization via Trustworthy SELinux'',ACM,2008.
|
65
2008
|
65
Masoom,,''Mode based behavior attestation'',SACMAT,2008.
|
66
2008
|
66
Masoom,,''Model-based behavior attestation'',SACMAT,2008.
|
67
2008
|
67
Masoom,,''Usage Control Platformization via Trustworthy SELinux'',ASIACCS,2008.
|
68
2008
|
68
M. Masoom Alam,,''Model based behavior attestation'', ACM,2008.
|
69
2008
|
69
Masoom,,''Constraint based role based access control in the SECTETframework A model-driven approach,'',JCS,2008.
|
70
2008
|
70
Masoom Alam,Michael Hafner,Ruth Breu''Constraint based role based access control in the SECTET-framework A model-driven approach'',Journal of Computer Security,2008.
|
71
2007
|
71
Ruth Breu,Gerhard Popp,Masoom Alam''Model Based Development of Access Policies'',Springer,2007.
|
72
2007
|
72
Masoom Alam,Michael Hafner,Ruth Breu''A Framework for Modelling Restricted Delegation of Rights in the SECTET'',International Journal of Computer Systems, Science and Engineering,2007.
|
73
2007
|
73
Breu,,''Constraint based role based access control in the SECTETframework A model-driven approach,'',Web Of Knowledge,2007.
|
74
2007
|
74
Masoom,,''A framework for modelling restricted delegation of rights in the SECTET'',Web Of Knowledge,2007.
|
75
2007
|
75
Masoom,,''Model-driven security engineering for trust management in SECTE'',CITESEERX,2007.
|
76
2007
|
76
Masoom Alam,Ruth Breu,Michael Hafner''Model-Driven Security Engineering for Trust Management in SECTET'',JOURNAL OF SOFTWARE (JSW),2007.
|
77
2007
|
77
B.,,''A Technical Architecture for Enforcing Usage Control Requirements in Service-Oriented Architectures'',ACM,2007.
|
78
2007
|
78
Masoom,,''Trusted SECTET: A Model-driven framework for trusted computing based systems,'',IEEE,2007.
|
79
2007
|
79
B.,,''A Technical Architecture for Enforcing Usage Control Requirements in Service-Oriented Architectures'',ACM,2007.
|
80
2006
|
80
Amir,,''Proposed Framework for Achieving Interoperable Services Between European Public Administrations'',ARES,2006.
|
81
2006
|
81
Amir,,''Proposed Framework for Achieving Interoperable Services Between European Public Administrations'',ARES,2006.
|
82
2006
|
82
Masoom,,''Constraint based Role Based Access Control for modelling administrative constraints in the SECTET'',ACM,2006.
|
83
2006
|
83
Masoom,,''A Constraint based Role Based Access Control in the SECTET A Model-Driven Approach'',ACM,2006.
|
84
2006
|
84
Masoom,,''framework for modelling restricted delegation in service oriented architecture'',TrustBus,2006.
|
85
2006
|
85
Masoom,,''framework for modelling restricted delegation in service oriented architecture'',TrustBus,2006.
|
86
2006
|
86
Masoom,,''Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems'',ACM,2006.
|
87
2006
|
87
Masoom,,''Pattern-to-Pattern Transformation in the SECTET'',ECMDA,2006.
|
88
2006
|
88
Michael,,''Towards a MOF/QVT-based domain architecture for model driven security'',MoDELS,2006.
|
89
2006
|
89
Masoom,,''Modelling Permissions in a (U/X) ML World'',IEEE,2006.
|
90
2006
|
90
Masoom,,''Modeling authorization in an SOA based application scenario'',IASTED,2006.
|
91
2006
|
91
Masoom,,''Model Driven Security for Web Services (MDS4WS)'',IEEE,2006.
|