Publications

Edited Books

Benjamin Aziz, Alvaro Arenas and Bruno Crispo (editors).  Engineering Secure Internet of Things Systems.  The Institution of Engineering and Technology (The IET), October 2016.

 

Joseph Morris, Benjamin Aziz, and Frederic Oehl (editors). Proceedings of the 6th International Workshop on Formal Methods. Electronic Workshops in Computing (eWiC), British Computer Society, July 2003.

 

Ph.D. Thesis (Download Here)

Benjamin Aziz.  A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems. Ph.D. Thesis, Dublin City University, 2003.

 

M.Sc. Dissertation (Download Here)

Benjamin Aziz.  Mobile Proxies. M.Sc. Dissertation, Trinity College Dublin, 1999.

 

Book Chapters

Benjamin Aziz.  On the Security of the MQTT Protocol.  In Engineering Secure Internet of Things Systems.  The Institution of Engineering and Technology (The IET), October 2016.

 

Benjamin Aziz, Paul Fremantle and Alvaro Arenas.  A Reputation Model for the Internet of Things.  In Engineering Secure Internet of Things Systems.  The Institution of Engineering and Technology (The IET), October 2016.

 

Alvaro Arenas, Benjamin Aziz, Fabio Martinelli, Marinella Petrocchi and Paolo Mori. Trust Management for Grid Systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development, IGI-Global, December 2009.

 

Journals

Ali Malik, Benjamin Aziz, Mo Adda and Chih-Heng Ke.  Optimisation Methods For Fast Restoration of Software-Defined Networks.  IEEE Access, 2017 (to appear).

 

Jean Tajer, Mo Adda and Benjamin Aziz.  Comparison between Divergence Measures for Anomaly Detection of Mobile Agents in IP Networks. International Journal of Wireless & Mobile Networks, AIRCC Publishing Corporation, vol. 9(3), June 2017.

 

Benjamin Aziz.  Modelling Fine-Grained Access Control Policies in Grids.  Journal of Grid Computing, Springer, vol. 14(3): 477-493, August 2016.

 

Nasser Al-hadhrami, Benjamin Aziz and Lotfi ben Othmane.  An Incremental B-Model for RBAC-controlled Electronic Marking System. In International Journal of Secure Software Engineering: Special Issue on Agile Secure Software Development, IGI Global, vol. 7(2): 37-62, April-June 2016.

 

Benjamin Aziz. A Formal Model and Analysis of an IoT Protocol.  Ad Hoc Networks, Elsevier, vol. 36(1): 49–57, January 2016.

 

Carl Adams, Amanda Peart, Penny Ross and Benjamin Aziz. Temporal Stakeholder Analysis of Future Technologies: Exploring the Impact of IoV.  Cutter IT Journal, vol. 28(7): 24-29, July 2015.

 

Alberto Gugel, Benjamin Aziz and Geoff Hamilton.  Revisiting the BAN-Modified Andrew Secure RPC Protocol.  Journal of Internet Services and Information Security, vol. 4(3): 82-96, August 2014.

 

Benjamin Aziz.  Modelling and Refinement of Forensic Data Acquisition Specifications.  Digital Investigation, Elsevier, vol. 11(2): 90-101, June 2014.

 

Benjamin Aziz and Ioana Sporea. Security and VO Management Capabilities in a Large-Scale Grid Operating System.  Computing and Informatics, Slovak Academy of Sciences, vol. 33(2): 303-326, 2014.

 

Benjamin Aziz and Geoff Hamilton.  Enforcing Reputation Constraints on Business Process Workflows.  Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 5(1):101-121, March 2014.

 

Benjamin Aziz, Clive Blackwell and Shareeful Islam.  A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.  International Journal of Digital Crime and Forensics, IGI-Global, 5(2):1-22, 2013.

 

Omed Khalind, Julio Hernandez-Castro and Benjamin Aziz.  A Study on the False Positive Ratio of Stegdetect.  Digital Investigation, 9(3/4): 235-245, Elsevier, 2013.

 

Benjamin Aziz.  An Algorithm for Trading Grid Resources in a Virtual Marketplace.  Scalable Computing: Practice and Experience (Scientific International Journal for Parallel and Distributed Computing), West University of Timisoara, Romania, 13(4): 339-350, 2013.

 

Benjamin Aziz and Mario Tejedor-Gonzalez.  An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones.  International Journal of Security, Computer Science Journals, 6(4):45-57, 2012.

 

Ioana Sporea, Benjamin Aziz and Zak McIntyre.  On the Availability of Anti-Forensic Tools for Smartphones.  International Journal of Security, Computer Science Journals, 6(4): 58-64, 2012.

 

Benjamin Aziz and Geoff Hamilton. Verifying a Delegation Protocol for Grid Systems. Future Generation Computer Systems: The International Journal of Grid Computing and eScience, Elsevier, 27(5): 476–485, 2011.

 

Alvaro Arenas, Benjamin Aziz and Gheorghe Silaghi. Reputation Management in Collaborative Computing Systems. Journal of Security and Communication Networks, 3(6): 546–564, John Wiley and Sons, 2009.

 

Benjamin Aziz, Simon Foley, John Herbert and Garret Swart. Configuring Storage Area Networks Using Mandatory Security. Journal of Computer Security, 17(2):191-210, IOS Press, 2009.

 

Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems Using Process Calculi. International Journal of Foundations of Computer Science, 18(3):593-618, World Scientific, 2007.

 

Benjamin Aziz, Simon Foley, John Herbert and Garret Swart. Reconfiguring Role Based Access Control Policies Using Risk Semantics. Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration, 15(3):261-273, IOS Press, 2006.

 

Benjamin Aziz, Geoff Hamilton and David Gray. A Static Analysis of Cryptographic Processes: The Denotational Approach. Journal of Logic and Algebraic Programming, 64(2):285-320, Elsevier, August 2005.

 

Conferences

Jean Tajer, Mo Adda and Benjamin Aziz.  Detection of Flooding Attacks on Mobile Agents Using Sketch Technique.  In Proceedings of the 2nd International Conference on Information Technology and Communications Security (SECITC 2017), Springer, Bucharest, Romania, June 2017 (to appear in LNCS).

 

Ali Malik, Benjamin Aziz, Chih-Heng Ke, Han Liu and Mo Adda.  Virtual Topology Partitioning Towards An Efficient Failure Recovery of Software Defined Networks.  In Proceedings of the 16th International Conference on Machine Learning and Cybernetics (ICMLC), Ningbo, China, July, 2017 (to appear in IEEE)

 

Jean Tajer, Mo Adda and Benjamin Aziz.  Flooding Attacks Detection of Mobile Agents in IP Networks.  Fourth International Conference on Computer Networks & Communications (CCNET-2017), pages 1-12, AIRCC Publishing Corporation, Dubai, UAE, April 2017.

 

Ali Malik, Benjamin Aziz and Mohamed Bader-El-Den.  Finding Most Reliable Paths For Software Defined Networks.  In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), Valencia, Spain, June 2017 (to appear in IEEE)

 

Paul Fremantle, Benjamin Aziz and Tom Kirkham.  Enhancing IoT Security and Privacy with Distributed Ledgers - a Position Paper.  In Proceedings of the 2nd International Conference of Internet of Things, Big Data and Security, Porto, Portugal, pages 344-349, SCITEPRESS – Science and Technology Publications, Lda. , April 2017.

 

Jean Tajer, Mo Adda and Benjamin Aziz.  New Computing Model for Securing Mobile Agents in IP Networks.  In Proceedings of the 2nd International Conference of Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, pages 232-238, SCITEPRESS – Science and Technology Publications, Lda. , April 2017.

 

Paul Fremantle and Benjamin Aziz. OAuthing: Privacy-enhancing Federation for the Internet of Things.  In Proceedings of the 2nd International Conference on Cloudification of the Internet of Things, Paris, France, IEEE, pages 17-22, November 2016.

 

Benjamin Aziz, Paul Fremantle, Rui Wei and Alvaro Arenas. A Utility-based Reputation Model for the Internet of Things.  In Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016), Ghent, Belgium, vol. 471, pages 261-275, May 2016.

 

Benjamin Aziz, Mohamed Bader and Cerana Hippolyte.  Search-based SQL Injection Attacks Testing using Genetic Programming.  In Proceedings of the 19th European Conference on Genetic Programming (EuroGP 2016), Porto, Portugal, LNCS 9594:183 -198, Springer, March 2016.

 

Tom Kirkham, Arnab Sinha, Nikos Parlavantzas, Bartosz Kryza, Paul Fremantle, Kyriakos Kritikos and Benjamin Aziz.  Privacy Aware on-Demand Resource Provisioning for IoT Data Processing.  In Proceedings of the 2nd EAI International Conference on IoT as a Service (IoTaaS 2015), Rome, Italy, LNICST, 170: 87-95, Springer, October 2015.

 

Omed Khalind and Benjamin Aziz.  A Better Detection of 2LSB Steganography via Standard Deviation of the Extended Pairs of Values.  In Proceedings of the 2015 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9497, Baltimore, USA, April 2015 (won best paper award).

 

Omed Khalind and Benjamin Aziz.  LSB Steganography with Improved Embedding Efficiency and Undetectability.  In Proceedings of the 4th International Conference on Signal & Image Processing (SIP 2015), Zurich, Switzerland, AIRCC CSCP, January 2015.

 

Benjamin Aziz.  A Formal Model and Analysis of the MQ Telemetry Transport Protocol.  In Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES 2014), Fribourg, Switzerland, IEEE, September 2014.

 

Omed Khalind and Benjamin Aziz.  Detecting 2LSB Steganography Using Extended Pairs of Values Analysis.  In Proceedings of the 2014 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9120, Baltimore, USA, May 2014.

 

Benjamin Aziz and Geoff Hamilton.  Reputation-Controlled Business Process Workflows.  In Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, Germany, pages 42-51, IEEE, September 2013.

 

Benjamin Aziz.  On Formalising Policy Refinement in Grid Virtual Organisations.  In Proceedings of the 11th International Conference on Software Engineering Research, Management and Applications (SERA 2013), Prague, Czech Republic, Studies in Computational Intelligence, 496:17-31, Springer, August 2013.

 

Clive Blackwell, Shareeful Islam and Benjamin Aziz.  Implementation of Digital Forensics Investigations Using a Goal-Driven Approach for a Questioned Contract.  In Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, USA, IFIP Advances in Information and Communication Technology 410: 153-167, Springer, January 2013.

 

Benjamin Aziz.  Towards Goal-Driven Digital Forensics Investigations.  In Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyfor-12), London, UK, May 2012.

 

Alvaro Arenas, Benjamin Aziz, Szymon Maj and Brian Matthews. An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper).  In Proceedings of the 4th European Conference ServiceWave 2011, Poznan, Poland, LNCS 6994: 112-121, Springer, October 2011.

 

Benjamin Aziz.  Correcting a Delegation Protocol for Grids.  In Proceedings of the 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse, France, LNCS 6863: 198-209, Springer, August 2011.

 

Benjamin Aziz, Shirley Crompton and Michael Wilson.  A Metadata Model for Data Centric Security.  In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 21-28, Springer, June 2011.

 

Benjamin Aziz, Alvaro Arenas and Michael Wilson.  SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements.  In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 29-36, Springer, June 2011.

 

Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui and Michael D. Wilson. An Event-B Approach to Data Sharing Agreements. In Proceedings of the 8th International Conference on Integrated Formal Methods (iFM 2010), Nancy, France, LNCS 6396: 28-42, Springer, October 2010.

 

Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec and Philip Robinson. Management of Security Policies in Virtual Organisations. In Proceedings of the 2010 International Conference on Security and Cryptography (Secrypt 2010), Athens, Greece, July 2010.

 

Benjamin Aziz, Alvaro Arenas, Shirley Crompton and Brian Matthews. From Community to Resource Policies: A Tool for the Automatic Refinement of VO Policies. In Proceedings of the 2009 UK e-Science All Hands Meeting, Oxford, UK, December 2009.

 

Benjamin Aziz and Geoff Hamilton. Detecting Man-in-the-Middle Attacks by Precise Timing. In Proceedings of The Third International Conference on Emerging Security Information, Systems and Technologies (Securware 2009), Athens, Greece, 81-86, IEEE Computer Society, June 2009 (won best paper award).

 

Federico Stagni, Alvaro Arenas, Benjamin Aziz and Fabio Martinelli. On Usage Control in Data Grids. In Proceedings of the 3rd IFIP International Conference on Trust Management (TM'09), Purdue University, West Lafayette, USA, IFIP Advances in Information and Communication Technology, vol. 300/2009, 99-116, June 2009.

 

Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi and Giovanni Cortese. Fine-grained continuous usage control of service based Grids the GridTrust Approach. In Proceedings of ServiceWave 2008, Madrid, Spain, December 2008.

 

Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. A Goal-Oriented Approach to Grid Security Requirements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.

 

Michael D. Wilson, Alvaro Arenas, Brian M. Matthews, Shirley Crompton and Benjamin Aziz. Security Policies in Scientific Data Sharing Agreements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.

 

Lorenzo Blasi, Alvaro Arenas, Benjamin Aziz, Paolo Mori, Umberto Rovati, Bruno Crispo, Fabio Martinelli and Philippe Massonet. A Secure Environment for Grid-Based Supply Chains. In Proceedings of the eChallenges e-2008 Conference, Stockholm, Sweden, October 2008.

 

Alvaro Arenas, Benjamin Aziz and Gheorghe Cosmin Silaghi. Reputation Management in Grid-based Virtual Organisations. In Proceedings of the 3rd International Conference on Security and Cryptography (Secrypt 2008), Porto, Portugal, INSTICC, July 2008.

 

Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci and Paolo Mori. Controlling Usage of Business Processes through Fine-Grained Security Policies. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), Turin, Italy, LNCS 5185:100-117, Springer, September 2008.

 

Juan Bicarregui, Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. Towards Modelling Obligations in Event-B. In Proceedings of the ABZ 2008 Conference, London, UK, LNCS 5238:181-194, Springer, September 2008.

 

Benjamin Aziz. Measuring the Speed of Information Leakage in Mobile Processes. In Proceedings of the 11th International Conference on Algebraic Methodology and Software Technology (AMAST'06), Kuressaare, Estonia, LNCS 4019:36-50, Springer, July 2006.

 

Benjamin Aziz, David Gray and Geoff Hamilton. A Static Analysis of PKI-based Systems. In Proceedings of the 9th Italian Conference on Theoretical Computer Science (ICTCS'05), Certosa di Pontignano (Siena), Italy, LNCS 3701:51-65, Springer, October 2005.

 

Garret Swart, Benjamin Aziz, Simon Foley and John Herbert. Trading Off Security in a Service Oriented Architecture. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, LNCS 3654:295-309, Springer-Verlag, August 2005.

 

Garret Swart, Benjamin Aziz, Simon Foley and John Herbert. Automatic Configuration of Services for Security, Bandwidth, Throughput and Availability. In Forum proceedings of the 2nd International Conference on Service Oriented Computing (IC-SOC'04), New York, USA, IBM Technical Report RA221, November 2004.

 

Benjamin Aziz, Simon N. Foley, John Herbert and Garret Swart. Configuring Storage-Area Networks for Mandatory Security. In Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain, 144:357-370, Kluwer, July 2004.

 

Bruno Blanchet and Benjamin Aziz. A Calculus for Secure Mobility. In Proceedings of the 8th Asian Computing Science Conference (Asian'03), Mumbai, India, LNCS 2896:188-204, Springer-Verlag, December 2003.

 

Benjamin Aziz, David Gray, Geoff Hamilton, Frederic Oehl, James Power, and David Sinclair. Implementing Protocol Verification for E-Commerce. In Proceedings of the 2001 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet (SSGRR'01), L’Aquila, Italy, August 2001.

 

Symposia

Richard Dennis, Gareth Owenson and Benjamin Aziz.  A Temporal Blockchain: A Formal Analysis.  In Proceedings of the 6th International Symposium on Security in Collaboration Technologies and Systems.  Orlando, USA, 430-437, IEEE, November 2016.

 

Omed Khalind and Benjamin Aziz.  Single-Mismatch 2LSB Embedding Method of Steganography.  In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013), Athens, Greece, 283 - 286, IEEE, December 2013.

 

Benjamin Aziz. Application of Formal Analysis to Enhancing Trust in a Complex Grid-based Operating System. In Proceedings of the 3rd International ACM SIGSOFT Symposium on Architecting Critical Systems (ISARCS 2012), Bertinoro, Italy, 41-50, ACM,  June 2012.

 

Benjamin Aziz, Alvaro E. Arenas and Michael Wilson.  Model-based Refinement of Security Policies in Collaborative Virtual Organisations. In Proceedings of the 3rd International Symposium on Engineering Secure Software and Systems (ESSOS’11), Madrid, Spain, LNCS 6542: 1-14, Springer, February 2011.

 

Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Christophe Ponsard and Philippe Massonet. From Goal-Oriented Requirements to Event-B Specifications. In Proceedings of the First NASA Formal Methods Symposium, California, USA, 96-105, NASA, April 2009.

 

Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews and Erica Yang. Modelling Security Properties in a Goal-based Operating System with Anti-Goals. In Proceedings of the Symposium on Requirements Engineering for Information Security (SRIES 2008), Barcelona, Spain, 1429-1436, IEEE Computer Society, March 2008.

 

Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. In Proceedings of the 2nd International Symposium on Distributed Objects and Applications (DOA'00), Antwerp, Belgium, 295-304, IEEE Press, September 2000.

 

Workshops

Benjamin Aziz, Ali Malik and Jeyong Jung.  Check Your Blind Spots: A New Cyber-Security Metric for Measuring Incident Response Readiness.  In Proceedings of the 4th International Workshop on Risk Assessment and Risk-driven Quality Assurance (RISK 2016), Graz, Austria, LNCS 10224: 19-33, Springer, October 2016.

 

Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. Goal-Oriented Requirement Engineering Support for Business Continuity Planning.  In Proceedings of the 2nd International Workshop on Conceptual Modeling in Requirements Engineering and Business Analysis (MReBA'15), Stockholm, Sweden, LNCS 9382: 259-269, Springer, December 2015.

 

Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai and Lotfi ben Othmane. Incremental Development of RBAC-controlled e-Marking System Using the B Method. In Proceedings of the 1st International Workshop on Agile Secure Software Development, Toulouse, France, 532-539, IEEE, August 2015.

 

Paul Fremantle, Jacek Kopecky, Benjamin Aziz. Web API Management Meets the Internet of Things. In Proceedings of the 2015 Services and Applications over Linked APIs and Data Workshop (SALAD2015), Portoroz, Slovenia, CEUR Workshop Proceedings, vol. 1359, 1-9, June 2015.

 

Paul Fremantle, Benjamin Aziz, Jacek Kopecky and Philip Scott.  Federated Identity and Access Management for the Internet of Things.  In Proceedings of the 2014 International Workshop on Secure Internet of Things (SIoT 2014), Wroclaw, Poland, 10-17, IEEE, September 2014.

 

Benjamin Aziz and Clive Blackwell.  Using Security Patterns for Modelling Security Capabilities in a Grid OS.  In Proceedings of the 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge, Attack and Forensic Patterns part of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), Oxford, UK, 422-427, IEEE April 2014.

 

Benjamin Aziz and Clive Blackwell.  Use of KAOS in Operational Digital Forensic Investigations. In Proceedings of the 2nd International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK, July 2013.

 

Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo and Silvio Causetti. A Secure and Scalable Grid-based Content Management System. In Proceedings of the 5th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2010), Krakow, Poland, 404-409, IEEE Computer Society, February 2010.

 

Shirley Crompton, Benjamin Aziz and Michael Wilson. Sharing Scientific Data: Scenarios and Challenges. In Proceedings of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 2009.

 

Alvaro Arenas, Benjamin Aziz and Juan Bicarregui. Policy Refinement in Virtual Organisations. In Proceedings of the 2008 Formal Aspects of Virtual Organisations Workshop (FAVO2008), Turku, Finland, May 2008.

 

Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Brian Matthews and Erica Yang. A Formal Security Requirements Model for a Grid-based Operating System. In Proceedings of the BCS-FACS 2007 Christmas Workshop: Formal Methods in Industry, London, UK, Electronic Workshops in Computing (eWiC), BCS, December 2007.

 

Alvaro Arenas, Benjamin Aziz, Juan Bicarregui and Brian Matthews. Managing Conflicts of Interest in Virtual Organisations. In Proceedings of the 3rd International Workshop on Security and Trust Management (STM'07), Dresden, Germany, ENTCS 197(2):45-56, Elsevier, September 2007.

 

Benjamin Aziz. A Semiring-based Quantitative Analysis of Mobile Systems. In Proceedings of the 3th International Workshop on Software Verification and Validation (SVV'05), Manchester, UK, ENTCS 157(1):3-21, Elsevier, May 2006.

 

Benjamin Aziz, Geoff Hamilton and David Gray. A Denotational Approach to the Static Analysis of Cryptographic Processes. In Proceedings of the International Workshop on Software Verification and Validation (SVV'03), Mumbai, India, ENTCS 118:19-36, Elsevier, December 2005.

 

David Gray, Benjamin Aziz and Geoff Hamilton. SPIKY: A Nominal Calculus for Modelling Protocols that use PKIs. In Proceedings of the International Workshop on Security Analysis of Systems: Formalism and Tools (SASYFT'04), Orleans, France, Technical Report RR-2004-11, Laboratoire d'Informatique Fondamentale d'Orleans, June 2004.

 

Benjamin Aziz and Geoff Hamilton. A Privacy Analysis for the Pi-calculus: The Denotational Approach. In Proceedings of the 2nd Workshop on the Specification, Analysis and Validation for Emerging Technologies (SAVE'02), Copenhagen, Denmark, July 2002.

 

Benjamin Aziz and Geoff Hamilton. A Denotational Semantics for the Pi-Calculus. In Proceedings of the 5th Irish Workshop in Formal Methods (IWFM'01), Trinity College, Dublin, Ireland, Electronic Workshops in Computing (eWiC), BCS, July 2001.

 

Posters

Benjamin Aziz, Philippe Massonet and Christophe Ponsard.  A Formal Model for Forensic Storage Media Preparation Tools. In Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, August 2014.

 

Adam Barker, Benjamin Aziz, Alvaro Arenas, Ian Johnson, Brian Matthews and Erica Y. Yang. Trust Management of Dynamic Virtual Organisations in XtreemOS, UK e-Science 2009 All Hands Meeting, December 2009.

 

Demos

Paul Fremantle and Benjamin Aziz. Privacy-enhancing Federated Middleware for the Internet of Things. In the 17th International ACM/IFIP/USENIX Middleware Conference (Middleware 2016), Trento, Italy, December 2016.

 

Technical Reports

Benjamin Aziz, Alvaro Arenas, Ian Johnson, Erica Yang, Matej Artac, Ales Cernivec, Philip Robinson and Yvon Jegou. Trust Management in the XtreemOS Operating System. XtreemOS Technical Report 5, 2010.

 

Federico Stagni, Alvaro Arenas and Benjamin Aziz. On Usage Control in Data Grids. CoreGrid Technical report TR-0154, STFC RAL, Oxfordshire, UK, 2008.

 

Benjamin Aziz. A Static Analysis of the Applied Pi-Calculus. Technical report 2006/15, Imperial College London, London, UK, 2006.

 

Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems using Process Calculi. Technical report 2006/14, Imperial College London, London, UK, 2006.

 

Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. Technical report TCD-CS-2000-57, Trinity College, Dublin, Ireland, December 2000.

 

Benjamin Aziz. Mobile Proxies. Technical report TCD-CS-1999-60, Trinity College, Dublin, Ireland, December 1999.

 

Project Deliverables

Methodology and Design Alternatives for Federation and Interoperability. EU FP6 Project XtreemOS Deliverable D3.5.15, 2010.

 

Methodology and Design Alternatives for Trust Services in XtreemOS. EU FP6 Project XtreemOS Deliverable D3.5.9, 2010.

 

Fourth Specification of the Security and VO Management Services. EU FP6 Project XtreemOS Deliverable D3.5.13, 2009.

 

Evaluation Report. EU FP6 Project GridTrust Deliverable D5.3, 2009.

 

VO Management System. EU FP6 Project GridTrust Deliverable D4.3, 2009.

 

A Framework for Reasoning about Trust and Security in Grids at Requirement and Application Levels. EU FP6 Project GridTrust Deliverable D4.1, 2009.

 

Methodologies and tools for data sharing agreement infrastructure. EU FP7 Consequence Deliverable D2.1, 2008.

 

Models and Framework for Metadata Generation and Policy Infrastructure. EU FP7 Consequence Deliverable D3.1, 2008.

 

Requirements Specification for the Sharing Sensitive Scientific Data Test Bed. EU FP7 Consequence Deliverable D6.1, 2008.

 

Integration of TSP Policies in the UCON Model and Integration of the UCON Model with the VO Model. EU FP6 GridTrust Deliverable D3.3, 2008.

 

Reasoning about Trust and Security Properties in Dynamic Virtual Organisations: State of the Art. EU FP6 Project GridTrust Deliverable D2.1, 2007.

 

Reasoning about Trust and Security Properties in Virtual Organisations. EU FP6 Project GridTrust Deliverable D2.2, 2007.

 

Report on Formal Analysis of Security Properties. EU FP6 project XtreemOS Deliverable D3.5.6, 2007.

 

News Articles

‘Mean blind spot’ leaves organisations vulnerable to cyber attack.  In UoP News, March 21, 2017 (http://uopnews.port.ac.uk/2017/03/21/mean-blind-spot-leaves-organisations-vulnerable-to-cyber-attack/)