2008 |
18 | EE | Juan Bicarregui,
Alvaro Arenas,
Benjamin Aziz,
Philippe Massonet,
Christophe Ponsard:
Towards Modelling Obligations in Event-B.
ABZ 2008: 181-194 |
17 | EE | Alvaro Arenas,
Benjamin Aziz,
Juan Bicarregui,
Brian Matthews,
Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
ARES 2008: 1429-1436 |
16 | EE | Syed Naqvi,
Philippe Massonet,
Benjamin Aziz,
Alvaro Arenas,
Fabio Martinelli,
Paolo Mori,
Lorenzo Blasi,
Giovanni Cortese:
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
ServiceWave 2008: 242-253 |
15 | EE | Benjamin Aziz,
Alvaro Arenas,
Fabio Martinelli,
Ilaria Matteucci,
Paolo Mori:
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
TrustBus 2008: 100-117 |
14 | EE | Alvaro Arenas,
Benjamin Aziz,
Juan Bicarregui,
Brian Matthews:
Managing Conflicts of Interest in Virtual Organisations.
Electr. Notes Theor. Comput. Sci. 197(2): 45-56 (2008) |
2007 |
13 | EE | Benjamin Aziz,
Geoff Hamilton:
Modelling and Analysis of PKI-Based Systems Using Process Calculi.
Int. J. Found. Comput. Sci. 18(3): 593-618 (2007) |
2006 |
12 | EE | Benjamin Aziz:
Measuring the Speed of Information Leakage in Mobile Processes.
AMAST 2006: 36-50 |
11 | EE | Benjamin Aziz:
A Semiring-based Quantitative Analysis of Mobile Systems.
Electr. Notes Theor. Comput. Sci. 157(1): 3-21 (2006) |
10 | EE | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks 15(3): 261-273 (2006) |
2005 |
9 | EE | Garret Swart,
Benjamin Aziz,
Simon N. Foley,
John Herbert:
Trading Off Security in a Service Oriented Architecture.
DBSec 2005: 295-309 |
8 | EE | Benjamin Aziz,
David Gray,
Geoff W. Hamilton:
A Static Analysis of PKI-Based Systems.
ICTCS 2005: 51-65 |
7 | EE | Benjamin Aziz,
Geoff W. Hamilton,
David Gray:
A Denotational Approach to the Static Analysis of Cryptographic Processes.
Electr. Notes Theor. Comput. Sci. 118: 19-36 (2005) |
6 | EE | Benjamin Aziz,
Geoff W. Hamilton,
David Gray:
A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebr. Program. 64(2): 285-320 (2005) |
2004 |
5 | | Benjamin Aziz,
Simon N. Foley,
John Herbert,
Garret Swart:
Configuring Storage Area Networks for Mandatory Security.
DBSec 2004: 357-370 |
2003 |
4 | | Joseph M. Morris,
Benjamin Aziz,
Frédéric Oehl:
6th International Workshop on Formal Methods, IWFM 2003, Dublin City University. 11 July, 2003
BCS 2003 |
3 | EE | Bruno Blanchet,
Benjamin Aziz:
A Calculus for Secure Mobility.
ASIAN 2003: 188-204 |
2001 |
2 | EE | Benjamin Aziz,
Geoff W. Hamilton:
A Denotational Semantics for the Pi-Calculus.
IWFM 2001 |
2000 |
1 | EE | Benjamin Aziz,
Christian Damsgaard Jensen:
Adaptability in CORBA: The Mobile Proxy Approach.
DOA 2000: 295-304 |