| 2009 |
20 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Configuring storage-area networks using mandatory security.
Journal of Computer Security 17(2): 191-210 (2009) |
| 2008 |
19 | | Juan Bicarregui,
Alvaro Arenas,
Benjamin Aziz,
Philippe Massonet,
Christophe Ponsard:
Towards Modelling Obligations in Event-B.
ABZ 2008: 181-194 |
18 | | Alvaro Arenas,
Benjamin Aziz,
Juan Bicarregui,
Brian Matthews,
Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
ARES 2008: 1429-1436 |
17 | | Álvaro Enrique Arenas,
Benjamin Aziz,
Gheorghe Cosmin Silaghi:
Reputation Management in Grid-based Virtual Organisations.
SECRYPT 2008: 538-545 |
16 | | Syed Naqvi,
Philippe Massonet,
Benjamin Aziz,
Alvaro Arenas,
Fabio Martinelli,
Paolo Mori,
Lorenzo Blasi,
Giovanni Cortese:
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
ServiceWave 2008: 242-253 |
15 | | Benjamin Aziz,
Alvaro Arenas,
Fabio Martinelli,
Ilaria Matteucci,
Paolo Mori:
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
TrustBus 2008: 100-117 |
14 | | Alvaro Arenas,
Benjamin Aziz,
Juan Bicarregui,
Brian Matthews:
Managing Conflicts of Interest in Virtual Organisations.
Electr. Notes Theor. Comput. Sci. 197(2): 45-56 (2008) |
| 2007 |
13 | | Benjamin Aziz,
Geoff Hamilton:
Modelling and Analysis of PKI-Based Systems Using Process Calculi.
Int. J. Found. Comput. Sci. 18(3): 593-618 (2007) |
| 2006 |
12 | | Benjamin Aziz:
Measuring the Speed of Information Leakage in Mobile Processes.
AMAST 2006: 36-50 |
11 | | Benjamin Aziz:
A Semiring-based Quantitative Analysis of Mobile Systems.
Electr. Notes Theor. Comput. Sci. 157(1): 3-21 (2006) |
10 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks 15(3): 261-273 (2006) |
| 2005 |
9 | | Garret Swart,
Benjamin Aziz,
Simon N. Foley,
John Herbert:
Trading Off Security in a Service Oriented Architecture.
DBSec 2005: 295-309 |
8 | | Benjamin Aziz,
David Gray,
Geoff W. Hamilton:
A Static Analysis of PKI-Based Systems.
ICTCS 2005: 51-65 |
7 | | Benjamin Aziz,
Geoff W. Hamilton,
David Gray:
A Denotational Approach to the Static Analysis of Cryptographic Processes.
Electr. Notes Theor. Comput. Sci. 118: 19-36 (2005) |
6 | | Benjamin Aziz,
Geoff W. Hamilton,
David Gray:
A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebr. Program. 64(2): 285-320 (2005) |
| 2004 |
5 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Configuring Storage Area Networks for Mandatory Security.
DBSec 2004: 357-370 |
| 2003 |
4 | | Joseph M. Morris,
Benjamin Aziz,
Frédéric Oehl:
6th International Workshop on Formal Methods, IWFM 2003, Dublin City University. 11 July, 2003
BCS 2003 |
3 | | Bruno Blanchet,
Benjamin Aziz:
A Calculus for Secure Mobility.
ASIAN 2003: 188-204 |
| 2001 |
2 | | Benjamin Aziz,
Geoff W. Hamilton:
A Denotational Semantics for the Pi-Calculus.
IWFM 2001 |
| 2000 |
1 | | Benjamin Aziz,
Christian Damsgaard Jensen:
Adaptability in CORBA: The Mobile Proxy Approach.
DOA 2000: 295-304 |