Остановите войну!
for scientists:
default search action
Benjamin Aziz
- > Home > Persons > Benjamin Aziz
Publications
- 2019
- [j20]Paul Fremantle, Benjamin Aziz:
Deriving event data sharing in IoT systems using formal modelling and analysis. Internet Things 8 (2019) - 2018
- [j19]Paul Fremantle, Benjamin Aziz:
Cloud-based federated identity for the Internet of Things. Ann. des Télécommunications 73(7-8): 415-427 (2018) - 2017
- [c48]Paul Fremantle, Benjamin Aziz, Tom Kirkham:
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - . IoTBDS 2017: 344-349 - 2016
- [c46]Paul Fremantle, Benjamin Aziz:
OAuthing: Privacy-enhancing federation for the Internet of Things. CIoT 2016: 1-6 - [c43]Paul Fremantle, Benjamin Aziz:
Privacy-enhancing Federated Middleware for the Internet of Things. Middleware Posters and Demos 2016: 33-34 - [c41]Benjamin Aziz, Paul Fremantle, Rui Wei, Álvaro Enrique Arenas:
A Utility-Based Reputation Model for the Internet of Things. SEC 2016: 261-275 - 2015
- [c39]Álvaro Enrique Arenas, Philippe Massonet, Christophe Ponsard, Benjamin Aziz:
Goal-Oriented Requirement Engineering Support for Business Continuity Planning. ER Workshops 2015: 259-269 - [c38]Paul Fremantle, Jacek Kopecký, Benjamin Aziz:
Web API Management Meets the Internet of Things. SALAD@ESWC 2015: 1-9 - [c37]Paul Fremantle, Jacek Kopecký, Benjamin Aziz:
Web API Management Meets the Internet of Things. ESWC (Satellite Events) 2015: 367-375 - [c36]Tom Kirkham, Arnab Sinha, Nikos Parlavantzas, Bartosz Kryza, Paul Fremantle, Kyriakos Kritikos, Benjamin Aziz:
Privacy Aware on-Demand Resource Provisioning for IoT Data Processing. IoT 360 (2) 2015: 87-95 - 2014
- [c34]Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
A Formal Model for Forensic Storage Media Preparation Tools. SECRYPT 2014: 165-170 - [c33]Paul Fremantle, Benjamin Aziz, Jacek Kopecký, Philip J. Scott:
Federated Identity and Access Management for the Internet of Things. SIoT 2014: 10-17 - 2011
- [c26]Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. ESSoS 2011: 1-14 - [c25]Alvaro E. Arenas, Benjamin Aziz, Szymon Maj, Brian Matthews:
An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper). ServiceWave 2011: 112-121 - [c24]Benjamin Aziz, Shirley Y. Crompton, Michael D. Wilson:
A Metadata Model for Data Centric Security. STA 2011: 21-28 - [c23]Benjamin Aziz, Alvaro Arenas, Michael D. Wilson:
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements. STA 2011: 29-36 - 2010
- [j5]Alvaro E. Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation management in collaborative computing systems. Secur. Commun. Networks 3(6): 546-564 (2010) - [c21]Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:
A Secure and Scalable Grid-Based Content Management System. ARES 2010: 404-409 - [c20]Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, Michael D. Wilson:
An Event-B Approach to Data Sharing Agreements. IFM 2010: 28-42 - [c19]Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson:
Management of Security Policies in Virtual Organisations. SECRYPT 2010: 467-477 - 2009
- [j4]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security. J. Comput. Secur. 17(2): 191-210 (2009) - [c18]Federico Stagni, Alvaro Arenas, Benjamin Aziz, Fabio Martinelli:
On Usage Control in Data Grids. IFIPTM 2009: 99-116 - [c17]Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Christophe Ponsard, Philippe Massonet:
From Goal-Oriented Requirements to Event-B Specifications. NASA Formal Methods 2009: 96-105 - 2008
- [c15]Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals. ARES 2008: 1429-1436 - [c14]Juan Bicarregui, Alvaro Arenas, Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
Towards Modelling Obligations in Event-B. ABZ 2008: 181-194 - [c13]Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation Management in Grid-based Virtual Organisations. SECRYPT 2008: 538-545 - [c12]Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi, Giovanni Cortese:
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. ServiceWave 2008: 242-253 - [c11]Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. TrustBus 2008: 100-117 - 2007
- [c10]Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews:
Managing Conflicts of Interest in Virtual Organisations. STM@ESORICS 2007: 45-56 - 2006
- [j2]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics. J. High Speed Networks 15(3): 261-273 (2006) - 2005
- [c8]Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert:
Trading Off Security in a Service Oriented Architecture. DBSec 2005: 295-309 - 2004
- [c5]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring Storage Area Networks for Mandatory Security. DBSec 2004: 357-370 - 2000
- [c1]Benjamin Aziz, Christian Damsgaard Jensen:
Adaptability in CORBA: The Mobile Proxy Approach. DOA 2000: 295-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint