Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mukhtiar Memon is active.

Publication


Featured researches published by Mukhtiar Memon.


model driven engineering languages and systems | 2008

Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet

Michael Hafner; Mukhtiar Memon; M. A. Alam

This contribution gives an overview of various access control strategies in use in healthcare scenarios and shows how a variety of policies can be modeled based on a single security policy model for usage control, UCON. The core of this contribution consists of the specialization of the Sectet -Framework for Model Driven Security for complex healthcare scenarios based on UCON. The resulting Domain Architecture comprises a Domain Specific Language for the modeling of policies with advanced security requirements, a target architecture for the enforcement of these policies and model-to-code transformations.


Software and Systems Modeling | 2014

Security modeling for service-oriented systems using security pattern refinement approach

Mukhtiar Memon; Gordhan Das Menghwar; Mansoor H. Depar; Akhtar Ali Jalbani; Waqar M. Mashwani

Security is one of the critical aspects of current systems, which are based on loosely coupled and technology-agnostic service-oriented architectures (SOA). Though SOA is the driving force for enterprises to open their ends for global business collaborations, nevertheless it evolves many challenges for modeling and enforcing security. One of the main problems for designing secure systems is the lack of consistent frameworks and methodologies for modeling security concerns. Traditional approaches consider security at the end of system development, which evolves inflexible and un-configurable systems, which are too difficult to maintain and manage. The other major problem with current approaches is that they assume pre-defined and hard-coded security patterns and mechanisms for secure system design. Whereas, the evolving SOA systems require configurable security to realize different security patterns and security policies in a variety of business scenarios. To solve these problems, it is necessary to model security concerns from the beginning of system modeling in a platform-independent way. This paper proposes a pattern refinement approach for security modeling to achieve configurable and declarative security, based on the principles of abstraction, refinement, separation-of-concerns and maintainability to achieve flexible configurations of SOA security. In the proposed approach, a Domain Expert defines abstract policies using common security vocabulary and a Security Expert models security with patterns and refines them for a target architecture in successive systematic refinements. Furthermore, it facilitates the transformation of abstract security models into executable security policies for the target platforms.


Eurasip Journal on Wireless Communications and Networking | 2012

Cooperative space-time codes with network coding

Gordhan Das Menghwar; Akhtar Ali Jalbani; Mukhtiar Memon; Mansoor Hyder; Christoph F. Mecklenbräuker

Because of the gains like diversity, throughput, and the coverage extension provided by the multiple-input multiple-out (MIMO) systems, it has been part of the various wireless communications standards. However, to reap the benefits offered by MIMO systems in size-constrained nodes, used in wireless communications, has been a challenging issue. To address this challenge, cooperative communications has been introduced as an implementable way to exploit the multi-antenna (MIMO) gains in small size nodes. Various schemes or protocols have been devised to address the way by which cooperative communications actually takes place. In this article, we propose and investigate a novel scheme which provides a way to combine the benefits of space-time codes and network coding for cooperative communications. In this scheme, the cooperating users using space-time codes are assisted by the availability of a fixed relay node proposed for the future wireless networks. We compare our scheme with cooperative communications using Alamouti scheme and non-cooperative communications. With analytical results, we prove that the proposed scheme offers diversity gain of order three while cooperative communications using Alamouti scheme offers two and non-cooperative communications offers diversity order of one only. Moreover, the proposed relay assisted scheme outperforms by 15% in terms of multiplexing gain, the cooperative communications scheme being compared.


Journal of Universal Computer Science | 2009

SeAAS - A Reference Architecture for Security Services in SOA

Michael Hafner; Mukhtiar Memon; Ruth Breu


MODSEC@MoDELS | 2008

SECTISSIMO: A Platform-Independent Framework for Security Services.

Mukhtiar Memon; Michael Hafner; Ruth Breu


Archive | 2012

Cooperative Communications: A New Trend in the Wireless World

Gordhan Das Menghwar; Akhtar Ali Jalbani; Mukhtiar Memon; Mansoor Hyder


international workshop on security | 2018

Security as a Service - A Reference Architecture for SOA Security

Mukhtiar Memon; Michael Hafner; Ruth Breu


Sindh University Research Journal | 2018

A Study of News Recommender System using Natural Language Cloud Computing Services

Akhtar Ali Jalbani; Mukhtiar Memon; Muniba. Memon; S. Depar; M. Y. Koondhar


Sindh University Research Journal | 2012

STATE-OF-THE-ART IN EHEALTHCARE SECURITY AND PRIVACY

Mukhtiar Memon; A. Keerio; J. A. Mahar; Z. Hussain; Mansoor Hyder; Gordhan Das Menghwar


Sindh University Research Journal | 2012

OUTAGE PROBABILITY OF REPETITION CODING BASED ADAPTIVE DECODE-AND-FORWARD PROTOCOL FOR COOPERATIVE COMMUNICATIONS

Gordhan Das Menghwar; A. Keerio; Z. Hussain; Mukhtiar Memon

Collaboration


Dive into the Mukhtiar Memon's collaboration.

Top Co-Authors

Avatar

Gordhan Das Menghwar

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akhtar Ali Jalbani

Sindh Agriculture University

View shared research outputs
Top Co-Authors

Avatar

Ruth Breu

University of Innsbruck

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mansoor H. Depar

Sindh Agriculture University

View shared research outputs
Top Co-Authors

Avatar

Waqar M. Mashwani

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge