dblp.uni-trier.dewww.uni-trier.de

Benjamin Aziz

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
18EEJuan Bicarregui, Alvaro Arenas, Benjamin Aziz, Philippe Massonet, Christophe Ponsard: Towards Modelling Obligations in Event-B. ABZ 2008: 181-194
17EEAlvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang: Modelling Security Properties in a Grid-based Operating System with Anti-Goals. ARES 2008: 1429-1436
16EESyed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi, Giovanni Cortese: Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. ServiceWave 2008: 242-253
15EEBenjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori: Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. TrustBus 2008: 100-117
14EEAlvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews: Managing Conflicts of Interest in Virtual Organisations. Electr. Notes Theor. Comput. Sci. 197(2): 45-56 (2008)
2007
13EEBenjamin Aziz, Geoff Hamilton: Modelling and Analysis of PKI-Based Systems Using Process Calculi. Int. J. Found. Comput. Sci. 18(3): 593-618 (2007)
2006
12EEBenjamin Aziz: Measuring the Speed of Information Leakage in Mobile Processes. AMAST 2006: 36-50
11EEBenjamin Aziz: A Semiring-based Quantitative Analysis of Mobile Systems. Electr. Notes Theor. Comput. Sci. 157(1): 3-21 (2006)
10EEBenjamin Aziz, Simon N. Foley, John Herbert, Garret Swart: Reconfiguring Role Based Access Control policies using risk semantics. J. High Speed Networks 15(3): 261-273 (2006)
2005
9EEGarret Swart, Benjamin Aziz, Simon N. Foley, John Herbert: Trading Off Security in a Service Oriented Architecture. DBSec 2005: 295-309
8EEBenjamin Aziz, David Gray, Geoff W. Hamilton: A Static Analysis of PKI-Based Systems. ICTCS 2005: 51-65
7EEBenjamin Aziz, Geoff W. Hamilton, David Gray: A Denotational Approach to the Static Analysis of Cryptographic Processes. Electr. Notes Theor. Comput. Sci. 118: 19-36 (2005)
6EEBenjamin Aziz, Geoff W. Hamilton, David Gray: A static analysis of cryptographic processes: the denotational approach. J. Log. Algebr. Program. 64(2): 285-320 (2005)
2004
5 Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart: Configuring Storage Area Networks for Mandatory Security. DBSec 2004: 357-370
2003
4 Joseph M. Morris, Benjamin Aziz, Frédéric Oehl: 6th International Workshop on Formal Methods, IWFM 2003, Dublin City University. 11 July, 2003 BCS 2003
3EEBruno Blanchet, Benjamin Aziz: A Calculus for Secure Mobility. ASIAN 2003: 188-204
2001
2EEBenjamin Aziz, Geoff W. Hamilton: A Denotational Semantics for the Pi-Calculus. IWFM 2001
2000
1EEBenjamin Aziz, Christian Damsgaard Jensen: Adaptability in CORBA: The Mobile Proxy Approach. DOA 2000: 295-304

Coauthor Index

1Álvaro Enrique Arenas (Alvaro E. Arenas, Alvaro Arenas) [14] [15] [16] [17] [18]
2Juan Bicarregui [14] [17] [18]
3Bruno Blanchet [3]
4Lorenzo Blasi [16]
5Giovanni Cortese [16]
6Simon N. Foley [5] [9] [10]
7David Gray [6] [7] [8]
8Geoff W. Hamilton (Geoff Hamilton) [2] [6] [7] [8] [13]
9John Herbert [5] [9] [10]
10Christian Damsgaard Jensen [1]
11Fabio Martinelli [15] [16]
12Philippe Massonet [16] [18]
13Ilaria Matteucci [15]
14Brian Matthews [14] [17]
15Paolo Mori [15] [16]
16Joseph M. Morris [4]
17Syed Naqvi [16]
18Frédéric Oehl [4]
19Christophe Ponsard [18]
20Garret Swart [5] [9] [10]
21Erica Y. Yang [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)