Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model R Abdunabi, M Al-Lail, I Ray, RB France IEEE Systems Journal 7 (3), 501-515, 2013 | 52 | 2013 |
A trust-based access control model for pervasive computing applications M Toahchoodee, R Abdunabi, I Ray, I Ray Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009 | 46 | 2009 |
Towards enhancing programming self-efficacy perceptions among undergraduate information systems students. R Abdunabi, I Hbaci, HY Ku Journal of Information Technology Education: Research 18, 2019 | 35 | 2019 |
Specification and analysis of access control policies for mobile applications R Abdunabi, I Ray, R France Proceedings of the 18th acm symposium on access control models and …, 2013 | 24 | 2013 |
An Approach to Analyzing Temporal Properties in UML Class Models. M Al-Lail, R Abdunabi, RB France, I Ray, F Boulanger MoDeVVa@ MoDELS, 77-86, 2013 | 23 | 2013 |
Enforcing spatio-temporal access control in mobile applications R Abdunabi, W Sun, I Ray Computing 96, 313-353, 2014 | 20 | 2014 |
Evaluating higher education educators’ computer technology competencies in Libya I Hbaci, HY Ku, R Abdunabi Journal of Computing in Higher Education 33, 188-205, 2021 | 12 | 2021 |
Rigorous analysis of temporal access control properties in mobile systems M Al-Lail, R Abdunabi, RB France, I Ray 2013 18th International Conference on Engineering of Complex Computer …, 2013 | 9 | 2013 |
Access control for Internet of Things applications I Ray, R Abdunabi, R Basnet Proceedings of the 5th on Cyber-Physical System Security Workshop, 35-36, 2019 | 6 | 2019 |
An access control framework for mobile applications R Abdunabi Colorado State University, 2013 | 4 | 2013 |
Extensions to the Role Based Access Control Model for Newer Computing Paradigms R Abdunabi, I Ray CCWIC, 2010 | 4 | 2010 |
Secure Access Control for Healthcare Information Systems: A Body Area Network Perspective R Abdunabi, R Basnet, M Al Amin 2023 IEEE 13th Annual Computing and Communication Workshop and Conference …, 2023 | 2 | 2023 |
Predicting Perceived Programming Self-Efficacy for Information System Students R Abdunabi, I Hbaci, CS Center, T Nyambe Proceedings of the ISCAP Conference ISSN 2473, 4901, 2023 | 2 | 2023 |
A Comparison of Security Analysis Techniques for RBAC Models R Abdunabi, I Ray Proceedings of the 2nd Annual Colorado Celebration of Women in Computing …, 2010 | 2 | 2010 |
Examining Factors Predicting Programming Self-Efficacy for Computer Information Systems Students. R Abdunabi, I Hbaci, T Nyambe Information Systems Education Journal 22 (5), 2024 | | 2024 |
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach AA Younis, Y Hu, R Abdunabi 2023 10th International Conference on Dependable Systems and Their …, 2023 | | 2023 |
The Impact of Test Case Prioritization on Test Coverage versus Defects Found R Abdunabi, YK Malaiya Proceedings of the International Conference on Software Engineering Research …, 2017 | | 2017 |
2013 Index IEEE Systems Journal Vol. 7 S Abbas, R Abdunabi, S Abraham, M Afkousi-Paqaleh, AG Aghdam, ... IEEE Systems Journal 7 (4), 897, 2013 | | 2013 |