Items where Author is "Aziz, Benjamin"
Up a level |
Article
Aziz, Benjamin and Bukhelli, Aysha (2024) A study on human perception of document paragraph layout using surveys1. Intelligent Decision Technologies, 18 (2). pp. 1425-1445. ISSN 18724981
Aziz, Benjamin and Bukhelli, Aysha (2024) A study on human perception of document paragraph layout using surveys1. Intelligent Decision Technologies. pp. 1-21. ISSN 1875-8843
Aziz, Benjamin and Mohasseb, Alaa (2023) Cyber Incidents Risk Assessments Using Feature Analysis. SN Computer Science, 5 (1). ISSN 2661-8907
Aziz, Benjamin (2023) Analysing potential data security losses in organisations based on subsequent users logins. Plos one, 18 (8). e0286856.
Aziz, Benjamin (2023) Detecting Data Anomalies from Their Formal Specifications: A Case Study in IoT Systems. Electronics, 12 (3). p. 630.
Sallal, Muntadher, de Fréin, Ruairí, Malik, Ali and Aziz, Benjamin (2022) An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks. Array, 15. p. 100221. ISSN 2590-0056
Aziz, Benjamin and Aziz, Benjamin (2022) First Case Study: The MQTT Protocol. Formal Analysis by Abstract Interpretation: Case Studies in Modern Protocols. pp. 63-76.
Aziz, Benjamin and Aziz, Benjamin (2022) Second Case Study: The Hermes Protocol. Formal Analysis by Abstract Interpretation: Case Studies in Modern Protocols. pp. 77-85.
Aziz, Benjamin and Aziz, Benjamin (2022) Third Case Study: An Electric Vehicle Charging Protocol. Formal Analysis by Abstract Interpretation: Case Studies in Modern Protocols. pp. 87-108.
Aziz, Benjamin and others (2021) A Formalisation of Digital Forensic String Search Specifications. Research Briefs on Information and Communication Technology Evolution, 7. pp. 50-56.
Aziz, Benjamin (2021) A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications. J. Internet Serv. Inf. Secur., 11 (3). pp. 47-57.
Aziz, Benjamin (2021) A process algebraic mutation framework with application to a vehicle charging protocol. Veh. Commun., 30. p. 100352.
Aziz, Benjamin and Jung, Jeyong (2021) A study on securing safety via application of the blind spot metrics for report cases of the police. Safety Culture Research, 12 (1). pp. 47-58.
Mohasseb, Alaa, Aziz, Benjamin, Jung, Jeyong and Lee, Julak (2020) Cyber security incidents analysis and classification in a case study of Korean enterprises. Knowl. Inf. Syst., 62 (7). pp. 2917-2935.
Aziz, Benjamin (2020) Modeling and Analyzing an Industry 4.0 Communication Protocol. IEEE Internet Things J., 7 (10). pp. 10120-10127.
Malik, Ali, de Fréin, Ruair\'\i and Aziz, Benjamin (2020) Rapid restoration techniques for software-defined networks. Applied Sciences, 10 (10). p. 3411.
Malik, Ali, Aziz, Benjamin, Adda, Mo and Ke, Chih-Heng (2020) Smart routing: Towards proactive fault handling of software-defined networks. Comput. Networks, 170. p. 107104.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2020) Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks. IEEE Access, 8. pp. 91311-91325.
Fremantle, Paul and Aziz, Benjamin (2019) Deriving event data sharing in IoT systems using formal modelling and analysis. Internet Things, 8.
Malik, Ali, Aziz, Benjamin, Adda, Mo and Ke, Chih-Heng (2019) Smart Routing: Towards Proactive Fault-Handling in Software-Defined Networks. CoRR, abs/19.
Malik, Ali, Aziz, Benjamin, Al-Haj, Ali and Adda, Mo (2019) Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance. PeerJ Prepr., 7. e27624.
Aziz, Benjamin, Menychtas, Nikolaos and Al-Bazi, Ammar (2018) Anomaly analysis on an open DNS dataset. PeerJ Prepr., 6. e27116.
Fremantle, Paul and Aziz, Benjamin (2018) Cloud-based federated identity for the Internet of Things. Ann. des T\'l\'communications, 73 (7-8). pp. 415-427.
Aziz, Benjamin (2018) Towards a mutation analysis of IoT protocols. Inf. Softw. Technol., 100. pp. 183-184.
Aziz, Benjamin (2018) Towards open data-driven evaluation of access control policies. Comput. Stand. Interfaces, 56. pp. 13-26.
Aziz, Benjamin and Jung, Jeyong (2018) A false negative study of the steganalysis tool: Stegdetect. PeerJ Prepr., 6. e27339.
Tajer, Jean, Adda, Mo and Aziz, Benjamin (2017) Comparison between divergence measures for anomaly detection of mobile agents in ip networks. International Journal of Wireless & Mobile Networks (IJWMN), 9 (3).
Tajer, Jean, Adda, Mo and Aziz, Benjamin (2017) Detection of flooding attacks on mobile agents using sketch technique and divergence measures. International Journal of Engineering Sciences & Research Technology, 6 (8). pp. 112-121.
Malik, Ali, Aziz, Benjamin, Adda, Mo and Ke, Chih-Heng (2017) Optimisation Methods for Fast Restoration of Software-Defined Networks. IEEE Access, 5. pp. 16111-16123.
Al-Hadhrami, Nasser, Aziz, Benjamin and Othmane, Lotfi Ben (2016) An Incremental B-Model for RBAC-Controlled Electronic Marking System. Int. J. Secur. Softw. Eng., 7 (2). pp. 37-64.
Aziz, Benjamin (2016) Modelling Fine-Grained Access Control Policies in Grids. J. Grid Comput., 14 (3). pp. 477-493.
Aziz, Benjamin (2016) On the security of the MQTT protocol. Eng. Secur. Internet Things Syst. pp. 159-178.
Aziz, Benjamin (2016) A formal model and analysis of an IoT protocol. Ad Hoc Networks, 36. pp. 49-57.
Aziz, Benjamin, Fremantle, Paul and Arenas, AE (2016) A reputation model for the internet of things. Engineering Secure Internet of Things Systems; Aziz, B., Aranas, A., Crispo, B., Eds.
Khalind, Omed and Aziz, Benjamin (2015) LSB steganography with improved embedding efficiency and undetectability. Comp Sci Info Tech, 5 (1). pp. 89-105.
Adams, Carl Jeffrey, Peart, Amanda Jayne, Ross, Penelope Ann and Aziz, Benjamin (2015) Temporal stakeholder analysis of future technologies: exploring the impact of the ioV. Cutter IT Journal. p. 24.
Aziz, Benjamin and Hamilton, Geoff W. (2014) Enforcing Reputation Constraints on Business Process Workflows. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (1). pp. 101-121.
Aziz, Benjamin (2014) Modelling and refinement of forensic data acquisition specifications. Digit. Investig., 11 (2). pp. 90-101.
Gugel, Alberto, Aziz, Benjamin and Hamilton, Geoff (2014) Revisiting the ban-modified andrew secure rpc protocol. Journal of Internet Services and Information Security (JISIS), 4 (3). pp. 82-96.
Aziz, Benjamin and Sporea, Ioana (2014) Security and VO Management Capabilities in a Large-Scale Grid Operating System. Comput. Informatics, 33 (2). pp. 303-326.
Aziz, Benjamin, Blackwell, Clive and Islam, Shareeful (2013) A Framework for Digital Forensics and Investigations: The Goal-Driven Approach. Int. J. Digit. Crime Forensics, 5 (2). pp. 1-22.
Khalind, Omed S., C., Julio and Aziz, Benjamin (2013) A study on the false positive rate of Stegdetect. Digit. Investig., 9 (3-4). pp. 235-245.
Aziz, Benjamin (2012) An Algorithm for Trading Grid Resources in a Virtual Marketplace. Scalable Comput. Pract. Exp., 13 (4).
Sporea, Ioana, Aziz, Benjamin and McIntyre, Zak (2012) On the availability of anti-forensic tools for smartphones. International Journal of Security, 6 (4). pp. 58-64.
Aziz, Benjamin and Hamilton, Geoff W. (2011) Verifying a delegation protocol for grid systems. Future Gener. Comput. Syst., 27 (5). pp. 476-485.
Aziz, Benjamin, Arenas, A, Johnson, I, Artac, M, Cernivec, A and Robinson, P (2010) Management of security policies in virtual organisations. International Conference on Security and Cryptography.
Arenas, A, Aziz, Benjamin and Johnson, Ian (2010) Methodology and design alternatives for trust services in xtreemOS.
Arenas, Alvaro E., Aziz, Benjamin and Silaghi, Gheorghe Cosmin (2010) Reputation management in collaborative computing systems. Secur. Commun. Networks, 3 (6). pp. 546-564.
Aziz, Benjamin, Arenas, A, Johnson, I, Yang, E, Artac, M, Cernivec, A, Robinson, P and Jegou, Y (2010) Trust management in the xtreemOS operating system.
Aziz, Benjamin, Arenas, A, Cortese, Giovanni, Crispo, Bruno and Causetti, Silvio (2010) A secure and scalable Grid-based Content Management System. Fifth International Workshop on Frontiers in Availability, Reliability and.
Aziz, Benjamin, Foley, Simon N., Herbert, John and Swart, Garret (2009) Configuring storage-area networks using mandatory security. J. Comput. Secur., 17 (2). pp. 191-210.
Matthews, Brian, Arenas, Alvaro Enrique and Aziz, Benjamin (2009) Erica Y. Yang. POLICY.
Aziz, Benjamin (2009) Fourth specification of the security and VO management services.
Aziz, Benjamin (2009) Sharing Scientific Data: Scenarios and Challenges.
Aziz, Benjamin (2009) Sharing Scientific Data: Scenarios and Challenges.
Aziz, Benjamin (2009) A framework for reasoning about trust and security in grids at requirement and application levels.
Martinelli, Fabio, Petrocchi, Marinella, Matteucci, Ilaria, Orlov, Alexey, Starostin, Dmitry, Sbodio, Marco Luca, Arenas, Alvaro, Aziz, Benjamin, Crompton, Shirley and Wilson, Michael (2008) Methodologies and tools for data sharing agreement infrastructure.
Gowadia, V, Scalvino, A, Lupu, E and Aziz, Benjamin (2008) Models and framework for metadata generation and policy infrastructure.
Crompton, Shirley, Aziz, Benjamin, Wilson, Michael, Arenas, Alvaro and Matthews, Brian (2008) Requirements specification for the sharing sensitive scientific data test bed.
Aziz, Benjamin and Hamilton, Geoff W. (2007) Modelling and Analysis of PKI-Based Systems Using Process Calculi. Int. J. Found. Comput. Sci., 18 (3). pp. 593-618.
Aziz, Benjamin, Foley, Simon N., Herbert, John and Swart, Garret (2006) Reconfiguring Role Based Access Control policies using risk semantics. J. High Speed Networks, 15 (3). pp. 261-273.
Aziz, Benjamin (2006) A static analysis of the applied pi calculus.
Aziz, Benjamin, Hamilton, Geoff W. and Gray, David (2005) A static analysis of cryptographic processes: the denotational approach. J. Log. Algebraic Methods Program., 64 (2). pp. 285-320.
Aziz, Benjamin, Gray, David, Hamilton, Geoff, Oehl, Frederic, Power, James F and Sinclair, David (2001) Implementing protocol verification for E-commerce.
Aziz, Benjamin (1999) Mobile Proxies.
Aziz, Benjamin, Brucker, Achim, Carlsson, Bengt, Hoursanov, Andrey, Jaatun, Martin, Eichler, Joern, Khan, Khaled, ben Othmane, Lotfi, Röning, Juha, Quirchmayr, Gerald and others ASSD 2016.
Swart, Garret, Aziz, Benjamin, Foley, Simon and Herbert, John Automatic Configuration of Services for Security, Bandwidth, Throughput, and Availability.
Zomaya, Albert Y, Hu, Jia, Min, Geyong, Seelam, Seetharami, Wu, Yulei, Choudhary, Alok N, Calvo, Ramon Aguero, Adda, Mo, Aziz, Benjamin, Barnaghi, Payam and others CIT 2015 Organizing and Program Committees.
Georg, Laura, Aziz, Benjamin, Blasi, Lorenzo, Chabanne, Herve, Charoy, Fran\cois, Cukier, Michel, Godart, Claude, Hayes, Darren, Jensen, Jens, Kanoun, Wael and others CTS 2016.
Al-Haj, Ali and Aziz, Benjamin A Framework for Policy Enforcement Management in Database-Defined Networking (DDN).
Tajer, Jean, Adda, Mo and Aziz, Benjamin INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETECTION OF FLOODING ATTACKS ON MOBILE AGENTS USING SKETCH TECHNIQUE AND DIVERGENCE MEASURES.
Goubault-Larrecq, J, Roger, M, Verma, KN, Evans, N, Schneider, S, Aziz, Benjamin, Hamilton, G and Gray, D M. Backes 157 Contract signing, optimism, and advantage R. Chadha, JC Mitchell, A. Scedrov and V. Shmatikov 189 Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically.
Aziz, Benjamin and Hamilton, Geoff Options for Establishing Trust in a Complex Grid Operating System.
Mituca, Andrei, Moin, Amir H, Prehofer, Christian, Fremantle, Paul, Aziz, Benjamin, Kopeckỳ, Jacek and Scott, Philip SIoT 2014.
Matteucci, Ilaria, Mori, Paolo, Petrocchi, Marinella, Antòn, Annie, Aziz, Benjamin, Di Cerbo, Francesco, Dionysiou, Ioanna, Gonzalez, Marina Egea, Esayas, Samson Yoseph, Gago, Carmen Fernandez and others TELERISE 2015.
Aziz, Benjamin, Bhargava, Bharat, Bodden, Eric, van den Brand, Mark, Fitzgerald, Brian and Jaatun, Martin Gilje Workshop Program Committee ASSD 2015.
Book Section
Aziz, Benjamin, Arenas, Alvaro, Martinelli, Fabio, Mori, Paolo, Petrocchi, Marinella and Wilson, Michael (2012) Trust management for grid systems. In: Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications. IGI Global, pp. 1033-1061.
Conference or Workshop Item
Aziz, Benjamin, Makiyah, Estabraq H. and Bukhelli, Aysha (2024) An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing. In: SECRYPT 2024 – 21st International Conference on Security and Cryptography, 8th - 10th July 2024, Online.
Aziz, Benjamin and Bukhelli, Aysha (2023) Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning. In: 19th International Conference on Web Information Systems and Technologies (WEBIST), 15th - 17th November 2023, Online.
Chase, Leigh Edward, Mohasseb, Alaa and Aziz, Benjamin (2023) Epistemology for cyber security: a controlled natural language approach. In: The 6th International Conference on Information and Knowledge Systems.
Aziz, Benjamin and Bukhelli, Aysha Abdulmonem Abdulla Erhama (2023) A study on human perception of document paragraph layout. In: 14th International Conference on Information, Intelligence, Systems and Applications.
Hamilton, Geoff W. and Aziz, Benjamin (2022) Excommunication: Transforming \(π\)-Calculus Specifications to Remove Internal Communication. In: Formal Methods: Foundations and Applications - 25th Brazilian Symposium, SBMF 2022, Virtual Event, December 6-9, 2022, Proceedings.
Aziz, Benjamin, Bukhelli, Aysha, Khusainov, Rinat and Mohasseb, Alaa (2022) A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022, Lisbon.
Aziz, Benjamin and Mohasseb, Alaa (2022) Using Feature Analysis to Guide Risk Calculations of Cyber Incidents. In: Proceedings of the 18th International Conference on Web Information Systems and Technologies, WEBIST 2022, Valletta, Malta, October 25-27, 2022, Malta.
Chase, Leigh, Mohasseb, Alaa and Aziz, Benjamin (2021) The LeWiS Method: Target Variable Estimation using Cyber Security Intelligence. In: Proceedings of the 17th International Conference on Web Information Systems and Technologies, WEBIST 2021, October 26-28, 2021.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2020) Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs). In: 10th IEEE International Conference on Intelligent Systems, IS 2020, Varna, Bulgaria, August 28-30, 2020.
Ali, Omar, Scheidt, Nancy, Gegov, Alexander E., Haig, Ella, Adda, Mo and Aziz, Benjamin (2020) Automated Detection of Racial Microaggressions using Machine Learning. In: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020, Canberra, Australia, December 1-4, 2020.
Mohasseb, Alaa, Aziz, Benjamin and Kanavos, Andreas (2020) SMS Spam Identification and Risk Assessment Evaluations. In: Proceedings of the 16th International Conference on Web Information Systems and Technologies, WEBIST 2020, Budapest, Hungary, November 3-5, 2020.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2020) Towards Secure Data Sharing Processes in Online Social Networks: Trusty. In: Proceedings of the 15th International Conference on Software Technologies, ICSOFT 2020, Lieusaint, Paris, France, July 7-9, 2020.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2019) Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks. In: Sixth International Conference on Social Networks Analysis, Management and Security, SNAMS 2019, Granada, Spain, October 22-25, 2019.
Al-Haj, Ali and Aziz, Benjamin (2019) Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security. In: 2019 International Conference on Networked Systems, NetSys 2019, Munich, Germany, March 18-21, 2019.
Aziz, Benjamin, Lee, John Arthur and Akkuzu, Gulsum (2019) Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset. In: Business Information Systems Workshops - BIS 2019 International Workshops, Seville, Spain, June 26-28, 2019, Revised Papers.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2019) Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019.
Akkuzu, Gulsum, Aziz, Benjamin and Adda, Mo (2019) A Fuzzy Modeling Approach for Group Decision Making in Social Networks. In: Business Information Systems - 22nd International Conference, BIS 2019, Seville, Spain, June 26-28, 2019, Proceedings, Part II.
Mohasseb, Alaa, Aziz, Benjamin, Jung, Jeyong and Lee, Julak (2019) Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019.
Malik, Ali, Aziz, Benjamin and Adda, Mo (2019) Towards filling the gap of routing changes in software-defined networks. In: Proceedings of the Future Technologies Conference (FTC) 2018: Volume 2.
Akkuzu, Gulsum and Aziz, Benjamin (2018) Data-Driven Chinese Walls. In: 2018 Imperial College Computing Student Workshop, ICCSW 2018, September 20-21, 2018, London, United Kingdom.
Akkuzu, Gulsum, Aziz, Benjamin and Liu, Han (2018) Feature analysis on the containment time for cyber security incidents. In: 2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR).
Malik, Ali, Aziz, Benjamin and Ke, Chih-Heng (2018) THRIFTY: Towards High Reduction In Flow Table memorY. In: 2018 Imperial College Computing Student Workshop, ICCSW 2018, September 20-21, 2018, London, United Kingdom.
Fremantle, Paul, Aziz, Benjamin and Kirkham, Tom (2017) Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper -. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017.
Malik, Ali, Aziz, Benjamin and Bader-El-Den, Mohamed (2017) Finding most reliable paths for software defined networks. In: 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017.
Tajer, Jean, Adda, Mo, Aziz, Benjamin and others (2017) Flooding attacks detection of mobile agents in IP networks. In: Fourth International Conference on Computer Networks & Communications: CCNET 2017.
Tajer, Jean, Adda, Mo and Aziz, Benjamin (2017) New Computing Model for Securing Mobile Agents in IP Networks. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017.
Daoud, Mosaab and Aziz, Benjamin (2017) A New Decentralized Alignment-free Visualization Tool for Analyzing the Segmented Genome of a Virus in Feature Spaces. In: Technical Computing Prague 2017.
Malik, Ali, Aziz, Benjamin, Ke, Chih-Heng, Liu, Han and Adda, Mo (2017) Virtual topology partitioning towards an efficient failure recovery of software defined networks. In: 2017 International Conference on Machine Learning and Cybernetics, ICMLC 2017, Ningbo, China, July 9-12, 2017.
Aziz, Benjamin, Malik, Ali and Jung, Jeyong (2016) Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness. In: Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers.
Fremantle, Paul and Aziz, Benjamin (2016) OAuthing: Privacy-enhancing federation for the Internet of Things. In: 2016 Cloudification of the Internet of Things, CIoT 2016, Paris, France, November 23-25, 2016.
Fremantle, Paul and Aziz, Benjamin (2016) Privacy-enhancing Federated Middleware for the Internet of Things. In: Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, Middleware Posters and Demos 2016, Trento, Italy, December 12-16, 2016.
Aziz, Benjamin, Bader-El-Den, Mohamed and Hippolyte, Cerana (2016) Search-Based SQL Injection Attacks Testing Using Genetic Programming. In: Genetic Programming - 19th European Conference, EuroGP 2016, Porto, Portugal, March 30 - April 1, 2016, Proceedings.
Dennis, Richard, Owenson, Gareth and Aziz, Benjamin (2016) A Temporal Blockchain: A Formal Analysis. In: 2016 International Conference on Collaboration Technologies and Systems, CTS 2016, Orlando, FL, USA, October 31 - November 4, 2016.
Aziz, Benjamin, Fremantle, Paul, Wei, Rui and Enrique, \'lvaro (2016) A Utility-Based Reputation Model for the Internet of Things. In: ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings.
Enrique, \'lvaro, Massonet, Philippe, Ponsard, Christophe and Aziz, Benjamin (2015) Goal-Oriented Requirement Engineering Support for Business Continuity Planning. In: Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME Stockholm, Sweden, October 19-22, 2015, Proceedings.
Al-Hadhrami, Nasser, Aziz, Benjamin, Sardesai, Shantanu and Othmane, Lotfi Ben (2015) Incremental Development of RBAC-Controlled E-Marking System Using the B Method. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015.
Kirkham, Tom, Sinha, Arnab, Parlavantzas, Nikos, Kryza, Bartosz, Fremantle, Paul, Kritikos, Kyriakos and Aziz, Benjamin (2015) Privacy Aware on-Demand Resource Provisioning for IoT Data Processing. In: Internet of Things. IoT Infrastructures - Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II.
Fremantle, Paul, Kopeck\', Jacek and Aziz, Benjamin (2015) Web API Management Meets the Internet of Things. In: Proceedings of the Third Workshop on Services and Applications over Linked APIs and Data co-located with the 12th Extended Semantic Web Conference (ESWC 2015), Portoro\v, Slovenia, June 1, 2015.
Fremantle, Paul, Kopeck\', Jacek and Aziz, Benjamin (2015) Web API Management Meets the Internet of Things. In: The Semantic Web: ESWC 2015 Satellite Events - ESWC 2015 Satellite Events Portoro\v, Slovenia, May 31 - June 4, 2015, Revised Selected Papers.
Khalind, Omed and Aziz, Benjamin (2015) A better detection of 2LSB steganography via standard deviation of the extended pairs of values. In: Mobile Multimedia/Image Processing, Security, and Applications 2015.
Khalind, Omed and Aziz, Benjamin (2014) Detecting 2LSB steganography using extended pairs of values analysis. In: Mobile Multimedia/Image Processing, Security, and Applications 2014.
Fremantle, Paul, Aziz, Benjamin, Kopeck\', Jacek and Scott, Philip J. (2014) Federated Identity and Access Management for the Internet of Things. In: 2014 International Workshop on Secure Internet of Things, SIoT 2014, Wroclaw, Poland, September 10, 2014.
Aziz, Benjamin (2014) A Formal Model and Analysis of the MQ Telemetry Transport Protocol. In: Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014.
Aziz, Benjamin, Massonet, Philippe and Ponsard, Christophe (2014) A Formal Model for Forensic Storage Media Preparation Tools. In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014.
Aziz, Benjamin and Blackwell, Clive (2014) Using Security Patterns for Modelling Security Capabilities in Grid Systems. In: 8th IEEE International Symposium on Service Oriented System Engineering, SOSE 2014, Oxford, United Kingdom, April 7-11, 2014.
Blackwell, Clive, Islam, Shareeful and Aziz, Benjamin (2013) Implementation of digital forensics investigations using a goal-driven approach for a questioned contract. In: Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics.
Aziz, Benjamin (2013) On Formalising Policy Refinement in Grid Virtual Organisations. In: Software Engineering Research, Management and Applications selected papers from the 11th International Conference on Software Engineering Research, Management and Applications, {SERA} 2013, Prague, Czech Republic, August 7-9, 2013.
Aziz, Benjamin and Hamilton, Geoff W. (2013) Reputation-Controlled Business Process Workflows. In: 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013.
Khalind, Omed and Aziz, Benjamin (2013) Single-Mismatch 2LSB embedding method of steganography. In: IEEE International Symposium on Signal Processing and Information Technology IEEE.
Khalind, Omed S. and Aziz, Benjamin (2013) Single-mismatch 2LSB embedding steganography. In: IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013.
Aziz, Benjamin and Blackwell, Clive (2013) Use of KAOS in operational digital forensic investigations. In: Cyberpatterns 2013.
Blackwell, Clive, Islam, Shareeful and Aziz, Benjamin (2013) Using a Goal-Driven Approach in the Investigation of a Questioned Contract. In: Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers.
Aziz, Benjamin (2012) Application of formal analysis to enhancing trust in a complex grid-based operating system. In: Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, ISARCS 2012, part of Comparch '12 Federated Events on Component-Based Software Engineering and Software Architecture, Bertinoro, Italy, June 25-28, 2012.
Aziz, Benjamin (2012) Towards requirements-guided digital forensic investigations. In: 2nd International Conference on Cybercrime, Security and Digital Forensics.
Aziz, Benjamin and Tejedor-Gonzalez, Mario (2012) An android PGP manager: towards bridging end-user cryptography to smart phones. In: W3C Workshop on Access Control Application Scenarios.
Arenas, Alvaro E., Aziz, Benjamin, Maj, Szymon and Matthews, Brian (2011) An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper). In: Towards a Service-Based Internet - 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings.
Aziz, Benjamin (2011) Correcting a Delegation Protocol for Grids. In: Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings.
Aziz, Benjamin, Crompton, Shirley Y. and Wilson, Michael D. (2011) A Metadata Model for Data Centric Security. In: Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings.
Aziz, Benjamin, Arenas, Alvaro E. and Wilson, Michael D. (2011) Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. In: Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings.
Aziz, Benjamin, Arenas, Alvaro and Wilson, Michael D. (2011) SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements. In: Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings.
Aziz, Benjamin, Alvaro, A and Wilson, M (2011) A policy language for specifying data sharing agreements. In: Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management and Applications (STA 2011).
Arenas, Alvaro E., Aziz, Benjamin, Bicarregui, Juan and Wilson, Michael D. (2010) An Event-B Approach to Data Sharing Agreements. In: Integrated Formal Methods - 8th International Conference, IFM 2010, Nancy, France, October 11-14, 2010. Proceedings.
Aziz, Benjamin, Arenas, Alvaro, Johnson, Ian, Artac, Matej, Cernivec, Ales and Robinson, Philip (2010) Management of Security Policies in Virtual Organisations. In: SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications.
Aziz, Benjamin, Arenas, Alvaro, Cortese, Giovanni, Crispo, Bruno and Causetti, Silvio (2010) A Secure and Scalable Grid-Based Content Management System. In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland.
Aziz, Benjamin and Hamilton, Geoff W. (2009) Detecting Man-in-the-Middle Attacks by Precise Timing. In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece.
Aziz, Benjamin, Arenas, Alvaro, Bicarregui, Juan, Ponsard, Christophe and Massonet, Philippe (2009) From Goal-Oriented Requirements to Event-B Specifications. In: First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009.
Aziz, Benjamin, Alvaro, A, Crompton, Shirley and Matthews, Brian (2009) From community to resource policies: a tool for the automatic refinement of VO policies. In: UK All Hands Meeting: Past, Present and Future.
Stagni, Federico, Arenas, Alvaro, Aziz, Benjamin and Martinelli, Fabio (2009) On Usage Control in Data Grids. In: Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings.
Stagni, Federico, Arenas, Alvaro, Aziz, Benjamin and Martinelli, Fabio (2009) On usage control in data grids. In: Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings 3.
Barker, Adam, Aziz, Benjamin, Arenas, Alvaro, Johnson, Ian, Matthews, Brian and Yang, Erica (2009) Trust management of dynamic virtual organisations in xtreemOS. In: UK e-Science 2009 All Hands Meeting.
Aziz, Benjamin, Arenas, Alvaro, Martinelli, Fabio, Matteucci, Ilaria and Mori, Paolo (2008) Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings.
Aziz, Benjamin, Arenas, Alvaro, Martinelli, Fabio, Matteucci, Ilaria and Mori, Paolo (2008) Controlling usage in business process workflows through fine-grained security policies. In: Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings 5.
Naqvi, Syed, Massonet, Philippe, Aziz, Benjamin, Arenas, Alvaro, Martinelli, Fabio, Mori, Paolo, Blasi, Lorenzo and Cortese, Giovanni (2008) Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. In: Towards a Service-Based Internet, First European Conference, ServiceWave 2008, Madrid, Spain, December 10-13, 2008. Proceedings.
Naqvi, Syed, Massonet, Philippe, Aziz, Benjamin, Arenas, Alvaro, Martinelli, Fabio, Mori, Paolo, Blasi, Lorenzo and Cortese, Giovanni (2008) Fine-Grained Continuous Usage Control of Service Based Grids--The GridTrust Approach. In: Towards a Service-Based Internet: First European Conference, ServiceWave 2008, Madrid, Spain, December 10-13, 2008. Proceedings 1.
Arenas, Alvaro, Aziz, Benjamin, Bicarregui, Juan, Matthews, Brian and Yang, Erica Y. (2008) Modelling Security Properties in a Grid-based Operating System with Anti-Goals. In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain.
Arenas, A, Aziz, Benjamin and Bicarregui, J (2008) Policy refinement in virtual organisations. In: Formal Aspects of Virtual Organisations.
Enrique, \'lvaro, Aziz, Benjamin and Silaghi, Gheorghe Cosmin (2008) Reputation Management in Grid-based Virtual Organisations. In: SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications.
Arenas, A, Crompton, S, Matthews, B, Wilson, M, Aziz, Benjamin, Lupu, E, Scalavino, E, Martinelli, F and Petrocchi, M (2008) Security policies in scientific data sharing agreements. In: Science All Hands Meeting.
Bicarregui, Juan, Arenas, Alvaro, Aziz, Benjamin, Massonet, Philippe and Ponsard, Christophe (2008) Towards Modelling Obligations in Event-B. In: Abstract State Machines, B and Z, First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings.
Aziz, Benjamin, Alvaro, A, Massonet, P and Ponsard, C (2008) A goal-oriented approach to grid security requirements. In: UK e-Science All Hands Meeting.
Blasi, Lorenzo, Arenas, Alvaro, Aziz, Benjamin, Mori, Paolo, Rovati, Umberto, Crispo, Bruno, Martinelli, Fabio and Massonet, Philippe (2008) A secure environment for grid-based supply chains. In: Proceedings of the eChallenges e-2008 Conference.
Arenas, Alvaro, Aziz, Benjamin, Bicarregui, Juan and Matthews, Brian (2007) Managing Conflicts of Interest in Virtual Organisations. In: Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007.
Aziz, Benjamin, Arenas, Alvaro, Bicarregui, Juan, Matthews, Brian and Yang, Erica (2007) A formal security requirements model for a grid-based operating system. In: FACS 2007 Christmas Workshop: Formal Methods in Industry.
Aziz, Benjamin (2006) Measuring the Speed of Information Leakage in Mobile Processes. In: Algebraic Methodology and Software Technology, 11th International Conference, AMAST 2006, Kuressaare, Estonia, July 5-8, 2006, Proceedings.
Aziz, Benjamin (2005) A Semiring-based Quantitative Analysis of Mobile Systems. In: Proceedings of the Third International Workshop on Software Verification and Validation, SVV@ICFEM 2005, Manchester, UK, October 31, 2005.
Aziz, Benjamin, Gray, David and Hamilton, Geoff W. (2005) A Static Analysis of PKI-Based Systems. In: Theoretical Computer Science, 9th Italian Conference, ICTCS 2005, Siena, Italy, October 12-14, 2005, Proceedings.
Swart, Garret, Aziz, Benjamin, Foley, Simon N. and Herbert, John (2005) Trading Off Security in a Service Oriented Architecture. In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings.
Aziz, Benjamin, Foley, Simon N., Herbert, John and Swart, Garret (2004) Configuring Storage Area Networks for Mandatory Security. In: Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain.
Aziz, Benjamin, Foley, Simon N, Herbert, John and Swart, Garret (2004) Configuring storage-area networks for mandatory security. In: Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11. 3 Eighteenth Annual Conference on Data and Applications Security July 25--28, 2004, Sitges, Catalonia, Spain.
Gray, David, Aziz, Benjamin and Hamilton, Geoff (2004) Spiky: A nominal calculus for modelling protocols that use pkis. In: Proceedings of the International Workshop on Security Analysis of Systems: Formalism and Tools, Orléans, France.
Blanchet, Bruno and Aziz, Benjamin (2003) A Calculus for Secure Mobility. In: Advances in Computing Science - ASIAN 2003 Programming Languages and Distributed Computation, 8th Asian Computing Science Conference, Mumbai, India, December 10-14, 2003, Proceedings.
Aziz, Benjamin, Hamilton, Geoff W. and Gray, David (2003) A Denotational Approach to the Static Analysis of Cryptographic Processes. In: Proceedings of the International Workshop on Software Verification and Validation, SVV@ICLP 2003, Mumbai, India, December 14, 2003.
Aziz, Benjamin and Hamilton, Geoff (2002) A privacy analysis for the π-calculus: The denotational approach. In: Proceedings of the 2nd Workshop on the Specification, Analysis and Validation for Emerging Technologies.
Aziz, Benjamin and Hamilton, Geoff W. (2001) A Denotational Semantics for the Pi-Calculus. In: 5th Irish Workshop on Formal Methods, IWFM 2001, Dublin, Ireland, 16-17 July 2001.
Aziz, Benjamin and Jensen, Christian Damsgaard (2000) Adaptability in CORBA: The Mobile Proxy Approach. In: International Symposium on Distributed Objects and Applications, DOA 2000, Antwerp, Belgium, September 21-23, 2000.
Book
Aziz, Benjamin and Aziz, Benjamin (2022) Formal Analysis by Abstract Interpretation. Springer.
Aziz, Benjamin (2022) Formal Analysis by Abstract Interpretation - Case Studies in Modern Protocols. Springer.
Aziz, Benjamin, Arenas, Alvaro and Crispo, Bruno (2016) Engineering secure Internet of Things systems. Institution of Engineering and Technology.
Thesis
Aziz, Benjamin (1999) Mobile Proxies. Doctoral thesis, University of Dublin.