Benjamin Aziz, Ph.D.
Cited by
Cited by
Federated identity and access management for the internet of things
P Fremantle, B Aziz, J Kopecký, P Scott
2014 International Workshop on Secure Internet of Things, 10-17, 2014
A formal model and analysis of an IoT protocol
B Aziz
Ad Hoc Networks 36, 49-57, 2016
Reconfiguring role based access control policies using risk semantics
B Aziz, SN Foley, J Herbert, G Swart
Journal of High Speed Networks 15 (3), 261-273, 2006
A temporal blockchain: a formal analysis
R Dennis, G Owenson, B Aziz
2016 International Conference on Collaboration Technologies and Systems (CTSá…, 2016
Towards modelling obligations in Event-B
J Bicarregui, A Arenas, B Aziz, P Massonet, C Ponsard
International Conference on Abstract State Machines, B and Z, 181-194, 2008
Reputation management in collaborative computing systems
AE Arenas, B Aziz, GC Silaghi
Security and Communication Networks 3 (6), 546-564, 2010
Detecting man-in-the-middle attacks by precise timing
B Aziz, G Hamilton
2009 Third International Conference on Emerging Security Informationá…, 2009
From goal-oriented requirements to Event-B specifications
B Aziz, A Arenas, J Bicarregui, C Ponsard, P Massonet
First Nasa Formal Method Symposium, 2009
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
International Conference on Trust, Privacy and Security in Digital Businessá…, 2008
Reputation management in grid-based virtual organisations
A Arenas, B Aziz, G Silaghi
International Conference on Security and Cryptography, 2008
Managing conflicts of interest in virtual organisations
A Arenas, B Aziz, J Bicarregui, B Matthews
Electronic Notes in Theoretical Computer Science 197 (2), 45-56, 2008
A privacy analysis for the ­-calculus: The denotational approach
B Aziz, G Hamilton
Proceedings of the 2nd Workshop on the Specification, Analysis andá…, 2002
OAuthing: privacy-enhancing federation for the internet of things
P Fremantle, B Aziz
2016 Cloudification of the Internet of Things (CIoT), 1-6, 2016
Web api management meets the internet of things
P Fremantle, J Kopecký, B Aziz
European Semantic Web Conference, 367-375, 2015
A formal model and analysis of the MQ telemetry transport protocol
B Aziz
2014 Ninth International Conference on Availability, Reliability andá…, 2014
Optimisation methods for fast restoration of software-defined networks
A Malik, B Aziz, M Adda, CH Ke
IEEE Access 5, 16111-16123, 2017
On the availability of anti-forensic tools for smartphones
I Sporea, B Aziz, Z McIntyre
International Journal of Security 6 (4), 58-64, 2012
An event-B approach to data sharing agreements
AE Arenas, B Aziz, J Bicarregui, MD Wilson
International Conference on Integrated Formal Methods, 28-42, 2010
A secure and scalable grid-based content management system
B Aziz, A Arenas, G Cortese, B Crispo, S Causetti
2010 International Conference on Availability, Reliability and Security, 404-409, 2010
A static analysis of cryptographic processes: The denotational approach
B Aziz, G Hamilton, D Gray
The Journal of Logic and Algebraic Programming 64 (2), 285-320, 2005
The system can't perform the operation now. Try again later.
Articles 1–20