Research Group Security Engineering has several publications in international journals and conferences. The areas include high and low level security topics, model driven engineering, access control policies, formal methods and education. Following is a listing of the publications by different group members.

Masoom Alam, Muhammad Ali, Quratulain Alam, Tamleek Ali, Sajid Anwar,Awais Adnan and Mudasser Ali, “Mauth: A fine-grained and user-centric permission delegation framework for web services” accepted in International Journal of the Physical Sciences Vol. 6(6), pp. 2060-2071, 18 April, 2011 ISSN 1992 – 1950 ©2011 Academic Journals

Masoom alam, Hamad et al, “Android Runtime Security Policy Enforcement Framework” Accepetd for publication in Personal and Ubiqutos computing

Masoom Alam, Shahbaz Khan, Sanaullah Khan, Tamleek Ali, Xinwen Zhang. Multi-stakeholder Policy Model. Accepted in FTRA Smartphone 2010, International Workshop on Smartphone Applications and Services, Gwangju, Korea, December 9-11, 2010.

Tamleek Ali, Masoom Alam, M.Nauman. A Scalable and Privacy Preserving Remopte Attestation Mechanism Accepted in Special Issue of INFORMATION – AN INTERNATIONAL INTERDISCIPLINARY JOURNAL. Indexed ISI/SCI-E, Accepted October, 2010

Imran Khan, Nauman, M., Masoom Alam and Furqan Aziz. SAuthMash: Mobile Agent based Self Authorization in Mashups. Accepted at the International ACM Conference on Frontiers of Information Technology (FIT’09). 2009. ACM. Abottabad, Pakistan.

Shahbaz Khan, Sanaullah Khan, Mohammad Nauman, Tamleek Ali, Masoom Alam. Realizing Dynamic Behavior Attestation for Mobile Platforms. Accepted at the International Conference on Frontiers of Information Technology (FIT). Decemeber, 2009. Abottabad, Pakistan.

Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. Hung. Behavioral Attestation for Business Processes. Accepted at the International Conference on Web Services (ICWS’09). July, 2009. Los Angeles, USA.

Nauman, M., Masoom Alam, Xinwen Zhang and Tamleek Ali. Remote Attestation of Information Flows and Attribute Updates in a UCON System. 2nd International Conference on Techncial and Socio-Economic Aspects of Trusted Computing (Trust2009). Springer. April, 2009. Oxford, UK.

Masoom Alam, Xinwen Zhang, Nauman, M., and Tamleek Ali. 2008. Behavioral Attestation for Web Services (BA4WS). In Proceedings of International Workshop on Secure Web Services (SWS’08) at the 15th International ACM Conference on Computers and Communication Security (CCS’08). Fairfax, VA, USA, October, 2008. ACM.

Masoom Alam, M.Nauman, Xinwen Zhang ,Tamleek Ali, Patrick C. K. Hung, Behavioral Attestation for Web Services Based Business Processes, Published in International Journal of Web Services Research (IJWSR), Pages 52-72, DOI: 0.4018/jwsr.2010070103, ISSN: 1545-7362, EISSN: 1546-5004

Masoom Alam, Zhang, X., Nauman, M., Ali, T., and Seifert, J. 2008. Model-based Behavioral Attestation. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (Estes Park, CO, USA, June 11 – 13, 2008). SACMAT ‘08. ACM, New York, NY, 175-184. DOI= http://doi.acm.org/10.1145/1377836.1377864

Xinwen Zhang, Masoom Alam, and Jean-Pierre Seifert, and Qi LI, Usage Control Platformization via Trustworthy SELinux, in ACM Symposium on Information, Computer, and Communication Security, 2008.

Amin M., Shahbaz Khan, and Tamleek Ali. Trends and Directions in Trusted Computing: Models, Architectures and Technologies. IAENG. March, 2008. International MultiConference of Engineers and Computer Scientists (IMECS 08), Hong Kong.

Shahbaz Khan, Amin M., Mohammad Nauman, Tamlee Ali. A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC. IAENG. March, 2008. International MultiConference of Engineers and Computer Scientists (IMECS 08), Hong Kong.

Tamleek Ali, Nauman M. and Masoom Alam. An Accessible Formal Specification of the UML and OCL Meta-Model in Isabelle/HOL. IEEE. December, 2007. 11th IEEE International Multitopic Conference (INMIC 2007) Lahore, Pakistan.

Nauman M. and Uzair M. SE and CS Collaboration: Training Students for Engineering Large, Complex Systems. cseet, pp. 167-174, 20th Conference on Software Engineering Education & Training (CSEET’07), 2007

Masoom Alam, Michael Hafner, and Ruth Breu. Model Driven Security for Web Services (MDS4WS). In INMIC 2004, DOI: 10.1109/INMIC.2004.1492930/.

Ruth Breu, Gerhard Popp, and Masoom Alam. Model Based Development of Access Policies. Submitted for publication in the special section of STTT Journal devoted to extended versions of FASE04 and FASE05 papers.

Masoom Alam and Ruth Breu and Michael Hafner. Modeling Permissions in a (U/X)ML World. In /IEEE ARES 2006/. ISBN: 0-7695-2567-9.

Masoom Alam, Ruth Breu, and Michael Hafner. Model-Driven Security Engineering for Trust Management in SECTET. Published in the special section of JOURNAL OF SOFTWARE (JSW), devoted to extended versions of ARES 2006 Papers.

Masoom Alam, Michael Hafner, and Ruth Breu. Modeling authorization in an SOA based application scenario. In /IASTED Conf. on Software Engineering/, pages 79–84, 2006.

Masoom Alam, Michael Hafner, Ruth Breu, and Stefan Unterthiner. A framework for modelling restricted delegation in service oriented architecture. In TrustBus, pages 142–151, 2006.

Masoom Alam , Ruth Breu and Michael Hafner. Modelling Permissions in a (U/X) ML World, In IEEE ARES 2006. ISBN: 0-7695-2567-9.

Amir Hayat, S.Khan, Masoom Alam ,Identity Management System for Electronic Government Processes in Pakistan, published in High Capacity Optical Networks and Enabling Technologies, 2008.

Masoom Alam, Behavior Attestation for Business Process, accepted in Proceedings of the 2009 IEEE International Conference on Web Services Pages: 343-350, Year of Publication: 2009, ISBN: 978-0-7695-3709-2

A. Hayat, T. Rössler , Masoom Alam ” Proposed Framework for Achieving Interoperable Services Between European Public Administrations ARES 2006 – International Conference on Availability, Reliability and Security

Masoom Alam, Michael Hafner, Ruth Breu, and Steffan Untertheiner. A Framework for Modelling Restricted Delegation of Rights in the SECTET. Accepted for publication in the special issue of International Journal of Computer Systems, Science and Engineering devoted to Best TrustBus 06 Conference Papers.

Masoom Alam, Michael Hafner, and Ruth Breu. A Constraint based Role Based Access Control in the SECTET A Model-Driven Approach. In /Proceedings of the ACM PST 2006 – International Conference on Privacy, Security and Trust, October 30th, 2006 – November 1st, 2006.

Masoom Alam, Michael Hafner, and Ruth Breu. Constraint based Role Based Access Control for modelling administrative constraints in the SECTET. In Proceedings of the ACM PST 2006 – International Conference on Privacy, Security and Trust, October 30th, 2006. November 1st, 2006.

Masoom Alam and Michael Hafner and Ruth Breu. A Constraint based Role Based Access Control in the SECTET – A Model-Driven Approach. Submitted for publication in Journal of Computer Security (JCS).

Michael Hafner, Masoom Alam, and Ruth Breu. Towards a of QVT-based domain architecture for model driven security. In MoDELS, pages 275–290, 2006.

Masoom Alam and Ruth Breu. Pattern-to-Pattern Transformation in the SECTET. In workshop proceedings, published in the CTIT Technical Report series. (ISSN 1381-3625) as part of ECMDA 2006.

Masoom Alam. Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems. In /PhD Symposium of IEEE/ACM Models 2006, Italy Genoa. LNCS 4364.

B. Agreiter, Masoom Alam, R. Breu, M. Hafner, A. Pretschner, J.-P. Seifert, and X.Zhang, A Technical Architecture for Enforcing Usage Control Requirements in Service-Oriented Architectures, In ACM CCS Workshop for Secure Web services Proceedings of the 2007 ACM workshop on Secure web services

Masoom Alam , Jean-Pierre Seifert , Xinwen Zhang , Trusted SECTET: A Model driven framework for trusted computing based systems, Issue Date:October 2007 in IEEE EDOC 2007-11-23 pp. 75

Masoom Alam, Xinwen Zhang, Mohammed Nauman, Tamleek, Jean-Peirrre Seifert, Model based behavior attestation

Tamleek Ali Tanveer, Masoom Alam, and M.Nauman, Scalable Remote Attestation with Privacy Protection in Trust 2009

Tamleek Ali Tanveer, Masoom Alam M.Nauman, M.Amin, Scalable, Privacy-preserving Remote Attestation in and through Federates Identity Management Frameworks Accepted in ICISA 2010)

Masoom Alam, Xinwen Zhang, Mohammed Nauman, Sohail Khan, Fine-grained User-Centric Permission Delegation in Multi-Mashup Web Services, in SERVICES 2010

Masoom Alam, Hammad Bannuri, Shearyar Khan, Jawad Manzoor, Bahar Ali, Mohsin Yaseen, M.Yasir, Tamleek Ali, Xinwen Zhang, Quratulain, Android Runtime Security Policy Enforcement Framework, Accepted for being presented at The 2010 International Workshop on Smartphone Applications and Services

2 Responses to " Publications "
 
Shakir
November 30th, 2007

Great work, carry on.
Want to be a member. Is it possible?

 
Shahbaz
January 22nd, 2008

This needs to be updated. What do you suggest Nauman Sahib?

Leave a Reply


(Required)

(Required)