Mohammad Ubaidullah Bokhari

Work place: Aligarh Muslim University, Aligarh

E-mail: mubokhari@gmail.com

Website:

Research Interests: Software Construction, Software Engineering, Network Architecture, Network Security, Engineering

Biography

Mohammad Ubaidullah Bokhari, born in 1979. He is currently working as Associate Professor and Ex-Chairman, Department of Computer Science, AMU, Aligarh and has more than 24 years of teaching and research experience. He completed his Ph.D. in Computer Science from AMU, Aligarh. He has published more than 85 research papers in different reputed journals and conference proceedings. He has also authored 5 books on different fields of Computer Science. His current research interests are Cryptography Requirement Engineering, Software Reliability, Wireless Network Security and Database.

Author Articles
TSSR: A Proposed Tool for Secure Software Requirement Management

By Mohammad Ubaidullah Bokhari Shams Tabrez Siddiqui

DOI: https://doi.org/10.5815/ijitcs.2015.01.01, Pub. Date: 8 Dec. 2014

This paper provides a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which have been discussed, we introduce a requirement management tool known as TSSR (Tool for Secure Software Requirement). This tool manages risk analysis, system requirements, security of the system and project, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the TSSR framework and its four components: Planner, Modeller, Prover and Documenter which will be helpful in interacting and managing requirements with arbitrary number of external tools for secure software development.

[...] Read more.
A Detailed Analysis of Grain family of Stream Ciphers

By Mohammad Ubaidullah Bokhari Shadab Alam Syed Hamid Hasan

DOI: https://doi.org/10.5815/ijcnis.2014.06.05, Pub. Date: 8 May 2014

Hardware based ciphers are most suitable for resource constrained environments to provide information security and confidentiality. Grain is one such hardware based synchronous stream cipher. The motive of this study is to present a comprehensive survey and review of Grain family of stream ciphers that is one of the portfolio candidates in the hardware based category of eSTREAM. Security features and different attacks on these ciphers have been studied in this paper to analyze the strengths and weaknesses of these designs.

[...] Read more.
Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software

By Daniyal M Alghazzawi Shams Tabrez Siddiqui Mohammad Ubaidullah Bokhari Hatem S Abu Hamatta

DOI: https://doi.org/10.5815/ijitcs.2014.04.06, Pub. Date: 8 Mar. 2014

This paper discusses about the significance of selecting right requirements management tools. It’s no secret that poorly understood user requirements and uncontrolled scope creep to many software project failures. Many of the application development professionals buy wrong tools for the wrong reasons. To avoid purchasing the more complex and expensive tool, the organization needs to be realistic about the particular problem for which they opt. Software development organizations are improving the methods, they use to gather, analyze, trace, document, prioritize and manage their requirements. This paper considers four leading Requirements Management tools; Analyst Pro, CORE, Cradle and Caliber RM, the focus is to select the appropriate tool according to their capabilities and customers need.

[...] Read more.
Other Articles