Follow
Tanveer Mustafa
Tanveer Mustafa
Verified email at tzi.de
Title
Cited by
Cited by
Year
Enforcing role-based access control policies in web services with UML and OCL
K Sohr, T Mustafa, X Bao, GJ Ahn
2008 Annual Computer Security Applications Conference (ACSAC), 257-266, 2008
362008
Software security aspects of Java-based mobile phones
K Sohr, T Mustafa, A Nowak
Proceedings of the 2011 ACM Symposium on Applied Computing, 1494-1501, 2011
202011
Understanding the implemented access control policy of Android system services with slicing and extended static checking
T Mustafa, K Sohr
International Journal of Information Security 14, 347-366, 2015
162015
Secure mobile business information processing
N Kuntze, R Rieke, G Diederich, R Sethmann, K Sohr, T Mustafa, ...
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
72010
Towards formal specification and verification of a role-based authorization engine using jml
T Mustafa, M Drouineaud, K Sohr
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
52010
Implementing advanced RBAC administration functionality with USE
T Mustafa, K Sohr, DH Dang, M Drouineaud, S Kowski
Electronic Communications of the EASST 15, 2008
52008
Towards security program comprehension with design by contract and slicing
K Sohr, T Mustafa, P Hirch, M Gulmann
Technologie-Zentrum Informatik und Informationstechnik, 2016
32016
Towards formal specification and verification of a role-based authorization engine using jml (position paper)
T Mustafa, M Drouineaud, K Sohr
5th ACM ICSE Workshop on Software Engineering for Secure Systems (SESS10 …, 2010
22010
Static Security Analysis of Java Applications with an Approach Based on Design by Contract
T Mustafa
2013
The system can't perform the operation now. Try again later.
Articles 1–9