Khaled M. Khan

Khaled M. Khan is an Associate Professor in the department of Computer Science and Engineering and the Manager of KINDI Computing Research Lab at Qatar University. He was also the Graduate Program Coordinator for Master of Computing from 2009-2012. Prior to these, Khaled served Western Sydney University as Head of postgraduate programs in computing. His research interests include human factors in cyber security, secure software engineering, cloud computing, measuring security, trust in computer software, and software evolution. He has taught computing more than twenty five years at various universities in Asia, Europe, Africa, and Australia. Khaled received his BS and MS in computer science and informatics from the Norwegian University of Science and Technology. He received his PhD in computing from Monash University, Australia. He also holds a second bachelor's degree from the University of Dhaka (Bangladesh). He was the founding Editor-in-Chief of the International Journal of Secure Software Engineering (IJSSE) from 2009-2017. He is currently the Editor-in-Chief Emeritus of the IJSSE. Khaled has published more than 90 technical papers, and edited four books.

Publications

Developing and Evaluating Security-Aware Software Systems
Khaled M. Khan. © 2013. 367 pages.
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and...
Ell Secure Information System Using Modal Logic Technique
Yun Bai, Khaled M. Khan. © 2013. 13 pages.
In this paper, the authors propose a formal logic technique to protect information systems. As the widespread use of computer systems grows, the security of the information...
Security-Aware Systems Applications and Software Development Methods
Khaled M. Khan. © 2012. 416 pages.
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an...
Software Security Engineering: Design and Applications
Khaled M. Khan. © 2012. 2 pages.
Muthu Ramachandran from Leeds Metropolitan University, UK has recently published a book entitled, Software Security Engineering: Design and Applications. The author claims that...
A Tool Support for Secure Software Integration
Khaled M. Khan, Jun Han. © 2012. 21 pages.
This paper presents a tool for the integration of security-aware services based applications that is constructed on the principles of security characterization of individual...
State of Sharing Clinical Information in a Healthcare System in the Gulf
Khaled M. Khan. © 2012. 16 pages.
The main objectives of this paper are to study the extent of automation and the state of sharing of clinical data in out-patient services of a healthcare sector in the Gulf....
A Decision Support System for Selecting Secure Web Services
Khaled M. Khan. © 2011. 8 pages.
Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services...
Ell Secure Information System Using Modal Logic Technique
Yun Bai, Khaled M. Khan. © 2011. 12 pages.
In this paper, the authors propose a formal logic technique to protect information systems. As the widespread use of computer systems grows, the security of the information...
International Journal of Secure Software Engineering (IJSSE)
Martin Gilje Jaatun. Est. 2010.
The International Journal of Secure Software Engineering (IJSSE) publishes original research on the security concerns that construe during the software development practice....
A Tool Support for Secure Software Integration
Khaled Md Khan, Jun Han. © 2010. 22 pages.
This paper presents a tool for the integration of security-aware services based applications that is constructed on the principles of security characterization of individual...
A Decision Support System for Selecting Secure Web Services
Khaled M. Khan. © 2010. 9 pages.
Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services...
Security-Aware Service Specification for Healthcare Information Systems
Khaled M. Khan. © 2010. 6 pages.
With the rapid advancement of Web-based technologies, healthcare information systems are becoming increasingly heterogeneous in terms of their architecture, composition, and...
Managing Web Service Quality: Measuring Outcomes and Effectiveness
Khaled M. Khan. © 2009. 418 pages.
Web services are increasingly important in information technology with the expansive growth of the Internet. As services proliferate in domains ranging from e-commerce to digital...
International Journal of Web Portals (IJWP)
Maria Manuela Cruz-Cunha, Emanuel Soares Peres. Est. 2009.
Web portals are one of the most important components in the context of business integration. The International Journal of Web Portals (IJWP) is a high-quality refereed journal on...
International Journal of E-Services and Mobile Applications (IJESMA)
Mirjana Pejic-Bach. Est. 2009.
The objective of the International Journal of E-Services and Mobile Applications (IJESMA) is to be a truly interdisciplinary journal providing comprehensive coverage and...
A Decision Support System for Selecting Secure Web Services
Khaled M. Khan. © 2008. 7 pages.
Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services...
Security-Aware Service Specification for Healthcare Information Systems
Khaled M. Khan. © 2008. 5 pages.
With the rapid advancement of Web-based technologies, healthcare information systems are becoming increasingly heterogeneous in terms of their architecture, composition, and...
Managing Corporate Information Systems Evolution and Maintenance
Khaled M. Khan, Yan Zhang. © 2005. 392 pages.
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of...