Benjamin Aziz

According to our database1, Benjamin Aziz
  • authored at least 66 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Towards a mutation analysis of IoT protocols.
Information & Software Technology, 2018

Towards open data-driven evaluation of access control policies.
Computer Standards & Interfaces, 2018

Optimisation Methods for Fast Restoration of Software-Defined Networks.
IEEE Access, 2017

Finding most reliable paths for software defined networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

New Computing Model for Securing Mobile Agents in IP Networks.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - .
Proceedings of the 2nd International Conference on Internet of Things, 2017

Virtual topology partitioning towards an efficient failure recovery of software defined networks.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

An Incremental B-Model for RBAC-Controlled Electronic Marking System.
IJSSE, 2016

Modelling Fine-Grained Access Control Policies in Grids.
J. Grid Comput., 2016

A formal model and analysis of an IoT protocol.
Ad Hoc Networks, 2016

A Utility-Based Reputation Model for the Internet of Things.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Privacy-enhancing Federated Middleware for the Internet of Things.
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016

Search-Based SQL Injection Attacks Testing Using Genetic Programming.
Proceedings of the Genetic Programming - 19th European Conference, 2016

A Temporal Blockchain: A Formal Analysis.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

OAuthing: Privacy-enhancing federation for the Internet of Things.
Proceedings of the 2016 Cloudification of the Internet of Things, 2016

Privacy Aware on-Demand Resource Provisioning for IoT Data Processing.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Web API Management Meets the Internet of Things.
Proceedings of the Semantic Web: ESWC 2015 Satellite Events - ESWC 2015 Satellite Events Portorož, Slovenia, May 31, 2015

Web API Management Meets the Internet of Things.
Proceedings of the Third Workshop on Services and Applications over Linked APIs and Data co-located with the 12th Extended Semantic Web Conference (ESWC 2015), 2015

Goal-Oriented Requirement Engineering Support for Business Continuity Planning.
Proceedings of the Advances in Conceptual Modeling, 2015

Incremental Development of RBAC-Controlled E-Marking System Using the B Method.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Enforcing Reputation Constraints on Business Process Workflows.
JoWUA, 2014

Modelling and refinement of forensic data acquisition specifications.
Digital Investigation, 2014

Security and VO Management Capabilities in a Large-Scale Grid Operating System.
Computing and Informatics, 2014

Using Security Patterns for Modelling Security Capabilities in Grid Systems.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Federated Identity and Access Management for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014

A Formal Model for Forensic Storage Media Preparation Tools.
Proceedings of the SECRYPT 2014, 2014

A Formal Model and Analysis of the MQ Telemetry Transport Protocol.
Proceedings of the Ninth International Conference on Availability, 2014

A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.
IJDCF, 2013

A study on the false positive rate of Stegdetect.
Digital Investigation, 2013

On Formalising Policy Refinement in Grid Virtual Organisations.
Proceedings of the Software Engineering Research, 2013

Single-mismatch 2LSB embedding steganography.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Proceedings of the Advances in Digital Forensics IX, 2013

Reputation-Controlled Business Process Workflows.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

An Algorithm for Trading Grid Resources in a Virtual Marketplace.
Scalable Computing: Practice and Experience, 2012

Application of formal analysis to enhancing trust in a complex grid-based operating system.
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, 2012

Verifying a delegation protocol for grid systems.
Future Generation Comp. Syst., 2011

Correcting a Delegation Protocol for Grids.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Model-Based Refinement of Security Policies in Collaborative Virtual Organisations.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Reputation management in collaborative computing systems.
Security and Communication Networks, 2010

Management of Security Policies in Virtual Organisations.
Proceedings of the SECRYPT 2010, 2010

An Event-B Approach to Data Sharing Agreements.
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010

A Secure and Scalable Grid-Based Content Management System.
Proceedings of the ARES 2010, 2010

Configuring storage-area networks using mandatory security.
Journal of Computer Security, 2009

Detecting Man-in-the-Middle Attacks by Precise Timing.
Proceedings of the Third International Conference on Emerging Security Information, 2009

From Goal-Oriented Requirements to Event-B Specifications.
Proceedings of the First NASA Formal Methods Symposium, 2009

On Usage Control in Data Grids.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Managing Conflicts of Interest in Virtual Organisations.
Electr. Notes Theor. Comput. Sci., 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

Reputation Management in Grid-based Virtual Organisations.
Proceedings of the SECRYPT 2008, 2008

Towards Modelling Obligations in Event-B.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
Proceedings of the The Third International Conference on Availability, 2008

Modelling and Analysis of PKI-Based Systems Using Process Calculi.
Int. J. Found. Comput. Sci., 2007

Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks, 2006

A Semiring-based Quantitative Analysis of Mobile Systems.
Electr. Notes Theor. Comput. Sci., 2006

Measuring the Speed of Information Leakage in Mobile Processes.
Proceedings of the Algebraic Methodology and Software Technology, 2006

A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebr. Program., 2005

A Denotational Approach to the Static Analysis of Cryptographic Processes.
Electr. Notes Theor. Comput. Sci., 2005

A Static Analysis of PKI-Based Systems.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

Trading Off Security in a Service Oriented Architecture.
Proceedings of the Data and Applications Security XIX, 2005

Configuring Storage Area Networks for Mandatory Security.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

A Calculus for Secure Mobility.
Proceedings of the Advances in Computing Science, 2003

A Denotational Semantics for the Pi-Calculus.
Proceedings of the 5th Irish Workshop on Formal Methods, 2001

Adaptability in CORBA: The Mobile Proxy Approach.
Proceedings of the International Symposium on Distributed Objects and Applications, 2000