Research on software design level security vulnerabilities S Rehman, K Mustafa ACM SIGSOFT Software Engineering Notes 34 (6), 1-5, 2009 | 33 | 2009 |
Software Design Level Vulnerability Classification Model S Rehman, K Mustafa International Journal of Computer Science and Security (IJCSS) 6 (4), 238, 2012 | 17 | 2012 |
Security assurance by efficient access control and rights K Mustafa, SK Pandey, S Rehman CSI Communication 32 (6), 29-33, 2008 | 8 | 2008 |
Confidentiality related security assessments K Mustafa, S Rehman, SK Pandey IEEE International Advance Computing Conference. Patiala, 2009 | 4 | 2009 |
Software design level security vulnerabilities S Rehman, K Mustafa International Journal of Software Engineering 4 (2), 75-92, 2011 | 3 | 2011 |
Security Assurance–The Requirements Way SK Pandey, S Rehman, K Mustafa, SI Ahson Jan, 2008 | 2 | 2008 |
Software Authentication Vulnerabilities and Mitigation Mechanism S Rehman, K Mustafa International Conference on ' Emerging Trends in Computer Science …, 2010 | | 2010 |
CLASSIFICATION OF SOFTWARE SECURITY VULNERABILITIES SK Pandey, S Rehman, SI Ahson Advances in Computer Vision and Information Technology, 24, 2008 | | 2008 |
Security Assurance by Best SRE Practices SK Pandey, K Mustafa, SI Ahson, S Rehman International Journal of Computer Science and System Analysis 2 (1), 45-51, 2008 | | 2008 |
A Multitier High-level Mechanism for Secure Object Oriented Design K Mustafa, S Rehman International Conference on Advance Computing Technologies, 25-26 Dec 2008, 2008 | | 2008 |