Suivre
Ramadan Abdunabi
Ramadan Abdunabi
Faculty of Computer Information Systems, College of Business Colorado State University
Adresse e-mail validée de colostate.edu
Titre
Citée par
Citée par
Année
Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model
R Abdunabi, M Al-Lail, I Ray, RB France
IEEE Systems Journal 7 (3), 501-515, 2013
492013
A trust-based access control model for pervasive computing applications
M Toahchoodee, R Abdunabi, I Ray, I Ray
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009
442009
Towards Enhancing Programming Self-Efficacy Perceptions among Undergraduate Information Systems Students.
R Abdunabi, I Hbaci, HY Ku
Journal of Information Technology Education: Research 18, 2019
292019
Specification and analysis of access control policies for mobile applications
R Abdunabi, I Ray, R France
Proceedings of the 18th acm symposium on access control models and …, 2013
242013
An Approach to Analyzing Temporal Properties in UML Class Models.
M Al-Lail, R Abdunabi, RB France, I Ray, F Boulanger
MoDeVVa@ MoDELS, 77-86, 2013
212013
Enforcing spatio-temporal access control in mobile applications
R Abdunabi, W Sun, I Ray
Computing 96, 313-353, 2014
192014
Evaluating higher education educators’ computer technology competencies in Libya
I Hbaci, HY Ku, R Abdunabi
Journal of Computing in Higher Education 33, 188-205, 2021
122021
Rigorous analysis of temporal access control properties in mobile systems
M Al-Lail, R Abdunabi, RB France, I Ray
2013 18th International Conference on Engineering of Complex Computer …, 2013
92013
Access control for Internet of Things applications
I Ray, R Abdunabi, R Basnet
Proceedings of the 5th on Cyber-Physical System Security Workshop, 35-36, 2019
52019
An access control framework for mobile applications
R Abdunabi
Colorado State University, 2013
42013
Extensions to the Role Based Access Control Model for Newer Computing Paradigms
R Abdunabi, I Ray
CCWIC, 2010
42010
A Comparison of Security Analysis Techniques for RBAC Models
R Abdunabi, I Ray
Proceedings of the 2nd Annual Colorado Celebration of Women in Computing …, 2010
22010
Secure Access Control for Healthcare Information Systems: A Body Area Network Perspective
R Abdunabi, R Basnet, M Al Amin
2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023
12023
Predicting Perceived Programming Self-Efficacy for Information System Students
R Abdunabi, I Hbaci, CS Center, T Nyambe
Proceedings of the ISCAP Conference ISSN 2473, 4901, 2023
12023
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach
AA Younis, Y Hu, R Abdunabi
2023 10th International Conference on Dependable Systems and Their …, 2023
2023
The Impact of Test Case Prioritization on Test Coverage versus Defects Found
R Abdunabi, YK Malaiya
Proceedings of the International Conference on Software Engineering Research …, 2017
2017
2013 Index IEEE Systems Journal Vol. 7
S Abbas, R Abdunabi, S Abraham, M Afkousi-Paqaleh, AG Aghdam, ...
IEEE Systems Journal 7 (4), 897, 2013
2013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–17