Benjamin Aziz, Ph.D.
Benjamin Aziz, Ph.D.
Senior Lecturer, University of Portsmouth
Verified email at - Homepage
Cited by
Cited by
Federated identity and access management for the internet of things
P Fremantle, B Aziz, J Kopeckż, P Scott
2014 International Workshop on Secure Internet of Things, 10-17, 2014
A formal model and analysis of an IoT protocol
B Aziz
Ad Hoc Networks 36, 49-57, 2016
A temporal blockchain: a formal analysis
R Dennis, G Owenson, B Aziz
2016 International Conference on Collaboration Technologies and Systems (CTS …, 2016
Reconfiguring role based access control policies using risk semantics
B Aziz, SN Foley, J Herbert, G Swart
Journal of High Speed Networks 15 (3), 261-273, 2006
Detecting man-in-the-middle attacks by precise timing
B Aziz, G Hamilton
2009 Third International Conference on Emerging Security Information …, 2009
Towards modelling obligations in Event-B
J Bicarregui, A Arenas, B Aziz, P Massonet, C Ponsard
International Conference on Abstract State Machines, B and Z, 181-194, 2008
Reputation management in collaborative computing systems
AE Arenas, B Aziz, GC Silaghi
Security and Communication Networks 3 (6), 546-564, 2010
From goal-oriented requirements to Event-B specifications
B Aziz, AE Arenas, J Bicarregui, C Ponsard, P Massonet
Proceedings of the First NASA Formal Methods Symposium, 2009
Oauthing: privacy-enhancing federation for the internet of things
P Fremantle, B Aziz
2016 Cloudification of the Internet of Things (CIoT), 1-6, 2016
Web api management meets the internet of things
P Fremantle, J Kopeckż, B Aziz
European Semantic Web Conference, 367-375, 2015
A formal model and analysis of the MQ telemetry transport protocol
B Aziz
2014 Ninth International Conference on Availability, Reliability and …, 2014
Reputation Management in Grid-based Virtual Organisations.
ĮE Arenas, B Aziz, GC Silaghi
SECRYPT, 538-545, 2008
On the availability of anti-forensic tools for smartphones
I Sporea, B Aziz, Z McIntyre
International Journal of Security 6 (4), 58-64, 2012
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
International Conference on Trust, Privacy and Security in Digital Business …, 2008
A privacy analysis for the π-calculus: The denotational approach
B Aziz, G Hamilton
Proceedings of the 2nd Workshop on the Specification, Analysis and …, 2002
Managing conflicts of interest in virtual organisations
A Arenas, B Aziz, J Bicarregui, B Matthews
Electronic Notes in Theoretical Computer Science 197 (2), 45-56, 2008
Optimisation methods for fast restoration of software-defined networks
A Malik, B Aziz, M Adda, CH Ke
IEEE Access 5, 16111-16123, 2017
Enhancing IoT Security and Privacy with Distributed Ledgers-A Position Paper-.
P Fremantle, B Aziz, T Kirkham
IoTBDS, 344-349, 2017
Smart routing: Towards proactive fault handling of software-defined networks
A Malik, B Aziz, M Adda, CH Ke
Computer Networks 170, 107104, 2020
An event-B approach to data sharing agreements
AE Arenas, B Aziz, J Bicarregui, MD Wilson
International Conference on Integrated Formal Methods, 28-42, 2010
The system can't perform the operation now. Try again later.
Articles 1–20