Benjamin Aziz

According to our database1, Benjamin Aziz
  • authored at least 63 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Optimisation Methods for Fast Restoration of Software-Defined Networks.
IEEE Access, 2017

Finding most reliable paths for software defined networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

New Computing Model for Securing Mobile Agents in IP Networks.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
An Incremental B-Model for RBAC-Controlled Electronic Marking System.
IJSSE, 2016

Modelling Fine-Grained Access Control Policies in Grids.
J. Grid Comput., 2016

A formal model and analysis of an IoT protocol.
Ad Hoc Networks, 2016

A Utility-Based Reputation Model for the Internet of Things.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Privacy-enhancing Federated Middleware for the Internet of Things.
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016

Search-Based SQL Injection Attacks Testing Using Genetic Programming.
Proceedings of the Genetic Programming - 19th European Conference, 2016

A Temporal Blockchain: A Formal Analysis.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

OAuthing: Privacy-enhancing federation for the Internet of Things.
Proceedings of the 2016 Cloudification of the Internet of Things, 2016

2015
Privacy Aware on-Demand Resource Provisioning for IoT Data Processing.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Web API Management Meets the Internet of Things.
Proceedings of the Semantic Web: ESWC 2015 Satellite Events - ESWC 2015 Satellite Events Portorož, Slovenia, May 31, 2015

Web API Management Meets the Internet of Things.
Proceedings of the Third Workshop on Services and Applications over Linked APIs and Data co-located with the 12th Extended Semantic Web Conference (ESWC 2015), 2015

Goal-Oriented Requirement Engineering Support for Business Continuity Planning.
Proceedings of the Advances in Conceptual Modeling, 2015

Incremental Development of RBAC-Controlled E-Marking System Using the B Method.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Enforcing Reputation Constraints on Business Process Workflows.
JoWUA, 2014

Modelling and refinement of forensic data acquisition specifications.
Digital Investigation, 2014

Security and VO Management Capabilities in a Large-Scale Grid Operating System.
Computing and Informatics, 2014

Using Security Patterns for Modelling Security Capabilities in Grid Systems.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Federated Identity and Access Management for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014

A Formal Model for Forensic Storage Media Preparation Tools.
Proceedings of the SECRYPT 2014, 2014

A Formal Model and Analysis of the MQ Telemetry Transport Protocol.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.
IJDCF, 2013

A study on the false positive rate of Stegdetect.
Digital Investigation, 2013

On Formalising Policy Refinement in Grid Virtual Organisations.
Proceedings of the Software Engineering Research, 2013

Single-mismatch 2LSB embedding steganography.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Proceedings of the Advances in Digital Forensics IX, 2013

Reputation-Controlled Business Process Workflows.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
An Algorithm for Trading Grid Resources in a Virtual Marketplace.
Scalable Computing: Practice and Experience, 2012

Application of formal analysis to enhancing trust in a complex grid-based operating system.
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, 2012

2011
Verifying a delegation protocol for grid systems.
Future Generation Comp. Syst., 2011

Correcting a Delegation Protocol for Grids.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Model-Based Refinement of Security Policies in Collaborative Virtual Organisations.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
Reputation management in collaborative computing systems.
Security and Communication Networks, 2010

Management of Security Policies in Virtual Organisations.
Proceedings of the SECRYPT 2010, 2010

An Event-B Approach to Data Sharing Agreements.
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010

A Secure and Scalable Grid-Based Content Management System.
Proceedings of the ARES 2010, 2010

2009
Configuring storage-area networks using mandatory security.
Journal of Computer Security, 2009

Detecting Man-in-the-Middle Attacks by Precise Timing.
Proceedings of the Third International Conference on Emerging Security Information, 2009

From Goal-Oriented Requirements to Event-B Specifications.
Proceedings of the First NASA Formal Methods Symposium, 2009

On Usage Control in Data Grids.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

2008
Managing Conflicts of Interest in Virtual Organisations.
Electr. Notes Theor. Comput. Sci., 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

Reputation Management in Grid-based Virtual Organisations.
Proceedings of the SECRYPT 2008, 2008

Towards Modelling Obligations in Event-B.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
Proceedings of the The Third International Conference on Availability, 2008

2007
Modelling and Analysis of PKI-Based Systems Using Process Calculi.
Int. J. Found. Comput. Sci., 2007

2006
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks, 2006

A Semiring-based Quantitative Analysis of Mobile Systems.
Electr. Notes Theor. Comput. Sci., 2006

Measuring the Speed of Information Leakage in Mobile Processes.
Proceedings of the Algebraic Methodology and Software Technology, 2006

2005
A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebr. Program., 2005

A Denotational Approach to the Static Analysis of Cryptographic Processes.
Electr. Notes Theor. Comput. Sci., 2005

A Static Analysis of PKI-Based Systems.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

Trading Off Security in a Service Oriented Architecture.
Proceedings of the Data and Applications Security XIX, 2005

2004
Configuring Storage Area Networks for Mandatory Security.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A Calculus for Secure Mobility.
Proceedings of the Advances in Computing Science, 2003

2001
A Denotational Semantics for the Pi-Calculus.
Proceedings of the 5th Irish Workshop on Formal Methods, 2001

2000
Adaptability in CORBA: The Mobile Proxy Approach.
Proceedings of the International Symposium on Distributed Objects and Applications, 2000


  Loading...