Khaled Khan
Khaled Khan
Verified email at - Homepage
TitleCited byYear
Types of software evolution and software maintenance
N Chapin, JE Hale, KM Khan, JF Ramil, WG Tan
Journal of software maintenance and evolution: Research and Practice 13 (1 …, 2001
Establishing trust in cloud computing
KM Khan, Q Malluhi
IT professional 12 (5), 20-27, 2010
Composing security-aware software
KM Khan, J Han
IEEE software 19 (1), 34-41, 2002
A security characterisation framework for trustworthy component based software systems
KM Khan, J Han
Proceedings 27th Annual International Computer Software and Applications …, 2003
Measuring quality metrics for web applications
B Lilburne, P Devkota, KM Khan
2004 IRMA International Conference, 2004
Trust in cloud services: providing more controls to clients
KM Khan, Q Malluhi
Computer, 94-96, 2013
Physicochemical studies of pin-milled and air-classified dry edible bean fractions1
JY Han, K Khan
Cereal chemistry 67 (4), 384-390, 1990
Security-oriented service composition and evolution
KM Khan, R Kowalczyk, J Han
2006 13th Asia Pacific Software Engineering Conference (APSEC'06), 71-78, 2006
Managing corporate information systems evolution and maintenance
N Chapin
Managing Corporate Information Systems Evolution and Maintenance, 1-23, 2005
Addressing non-functional properties in software architecture using adl
CVEOH Khaled, M Khan
The Sixth Australasian Workshop on Software and System Architectures (AWSA …, 2005
Functional properties of pin-milled and air-classified dry edible bean fracitons
JY Han, K Khan
Cereal chemistry 67 (4), 390-394, 1990
Assessing security properties of software components: A software engineer's perspective
KM Khan, J Han
Australian Software Engineering Conference (ASWEC'06), 10 pp.-210, 2006
A framework for an active interface to characterise compositional security contracts of software components
K Khan, J Han, Y Zheng
Proceedings 2001 Australian Software Engineering Conference, 117-126, 2001
Addressing cloud computing in enterprise architecture: issues and challenges
K Khan, N Gangavarapu
Cutter Consortium, 2009
Deriving systems level security properties of component based composite systems
KM Khan, J Han
2005 Australian Software Engineering Conference, 334-343, 2005
Characterising user data protection of software components
KM Khan, J Han, Y Zheng
Proceedings 2000 Australian Software Engineering Conference, 3-11, 2000
A redefined software life cycle model for improved maintenance
T Skramstad, MK Khan
Proceedings Conference on Software Maintenance 1992, 193,194,195,196,197-193 …, 1992
Internal migration and socio-economic status of migrants: a study in Sylhet City, Bangladesh
IA Chowdhury, N Haque, MM Kamal, T Islam, MM Khan, MN Islam, ...
American Journal of Human Ecology 1 (4), 123-133, 2012
Security characterisation and compositional analysis for component-based software systems
KM Khan
Monash University, 2005
Incorporating business requirements and constraints in database conceptual models
KM Khan, M Kapurubandara, U Chadha
Proceedings of the first Asian-Pacific conference on Conceptual modelling …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20