Ramadan Abdunabi
Ramadan Abdunabi
Faculty of Computer Information Systems, College of Business Colorado State University
Verified email at colostate.edu
Cited by
Cited by
A trust-based access control model for pervasive computing applications
M Toahchoodee, R Abdunabi, I Ray, I Ray
IFIP Annual Conference on Data and Applications Security and Privacy, 307-314, 2009
Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model
R Abdunabi, M Al-Lail, I Ray, RB France
IEEE Systems Journal 7 (3), 501-515, 2013
Specification and analysis of access control policies for mobile applications
R Abdunabi, I Ray, R France
Proceedings of the 18th acm symposium on access control models and …, 2013
Enforcing spatio-temporal access control in mobile applications
R Abdunabi, W Sun, I Ray
Computing 96 (4), 313-353, 2014
An Approach to Analyzing Temporal Properties in UML Class Models.
M Al-Lail, R Abdunabi, RB France, I Ray, F Boulanger
MoDeVVa@ MoDELS, 77-86, 2013
Towards Enhancing Programming Self-Efficacy Perceptions among Undergraduate Information Systems Students.
R Abdunabi, I Hbaci, HY Ku
Journal of Information Technology Education 18, 2019
Rigorous Analysis of Temporal Access Control Properties in Mobile Systems
M Al-Lail, R Abdunabi, RB France, I Ray
2013 18th International Conference on Engineering of Complex Computer …, 2013
Extensions to the Role Based Access Control Model for Newer Computing Paradigms
R Abdunabi, I Ray
Oct, 2010
Evaluating higher education educators’ computer technology competencies in Libya
I Hbaci, HY Ku, R Abdunabi
Journal of Computing in Higher Education 33 (1), 188-205, 2021
Access control framework for mobile applications, An
R Abdunabi
2000-2019-CSU Theses and Dissertations, 2013
A Comparison of Security Analysis Techniques for RBAC Models
R Abdunabi, I Ray
Proceedings of the 2nd Annual Colorado Celebration of Women in Computing …, 2010
Access Control for Internet of Things Applications
I Ray, R Abdunabi, R Basnet
Proceedings of the 5th on Cyber-Physical System Security Workshop, 35-36, 2019
The Impact of Test Case Prioritization on Test Coverage versus Defects Found
R Abdunabi, YK Malaiya
Proceedings of the International Conference on Software Engineering Research …, 2017
2013 Index IEEE Systems Journal Vol. 7
S Abbas, R Abdunabi, S Abraham, M Afkousi-Paqaleh, AG Aghdam, ...
IEEE Systems Journal 7 (4), 897, 2013
The system can't perform the operation now. Try again later.
Articles 1–14