<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"> <head> <meta http-equiv=Content-Type content="text/html; charset=unicode"> <meta name=ProgId content=Word.Document> <meta name=Generator content="Microsoft Word 15"> <meta name=Originator content="Microsoft Word 15"> <link rel=File-List href="publications.fld/filelist.xml"> <!--[if gte mso 9]><xml> <o:DocumentProperties> <o:Author>Microsoft Office User</o:Author> <o:LastAuthor>Microsoft Office User</o:LastAuthor> <o:Revision>7</o:Revision> <o:TotalTime>10</o:TotalTime> <o:Created>2018-05-17T15:17:00Z</o:Created> <o:LastSaved>2018-08-04T19:55:00Z</o:LastSaved> <o:Pages>14</o:Pages> <o:Words>4284</o:Words> <o:Characters>24421</o:Characters> <o:Lines>203</o:Lines> <o:Paragraphs>57</o:Paragraphs> <o:CharactersWithSpaces>28648</o:CharactersWithSpaces> <o:Version>16.00</o:Version> </o:DocumentProperties> <o:OfficeDocumentSettings> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--> <link rel=themeData href="publications.fld/themedata.thmx"> <link rel=colorSchemeMapping href="publications.fld/colorschememapping.xml"> <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Print</w:View> <w:Zoom>170</w:Zoom> <w:SpellingState>Clean</w:SpellingState> <w:GrammarState>Clean</w:GrammarState> <w:TrackMoves>false</w:TrackMoves> <w:TrackFormatting/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-GB</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SplitPgBreakAndParaMark/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="&#45;-"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false" DefSemiHidden="false" DefQFormat="false" DefPriority="99" LatentStyleCount="375"> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 9"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footer"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index heading"/> <w:LsdException Locked="false" Priority="35" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="caption"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of figures"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope return"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="line number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="page number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of authorities"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="macro"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="toa heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 5"/> <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Closing"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Signature"/> <w:LsdException Locked="false" Priority="1" SemiHidden="true" UnhideWhenUsed="true" Name="Default Paragraph Font"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Message Header"/> <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Salutation"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Date"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Block Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="FollowedHyperlink"/> <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Document Map"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Plain Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="E-mail Signature"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Top of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Bottom of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal (Web)"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Acronym"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Cite"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Code"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Definition"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Keyboard"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Preformatted"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Sample"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Typewriter"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Variable"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Table"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation subject"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="No List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Contemporary"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Elegant"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Professional"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Balloon Text"/> <w:LsdException Locked="false" Priority="39" Name="Table Grid"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Theme"/> <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" Name="Light List"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/> <w:LsdException Locked="false" Priority="34" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" SemiHidden="true" UnhideWhenUsed="true" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/> <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/> <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/> <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/> <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/> <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/> <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Mention"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Smart Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hashtag"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Unresolved Mention"/> </w:LatentStyles> </xml><![endif]--> <style> <!--p.P1 {-webkit-text-stroke: #000000;} p.P2 {-webkit-text-stroke: #000000;} p.P3 {-webkit-text-stroke: #000000;} p.P4 {-webkit-text-stroke: #000000; min-height: 16.0px;} p.P5 {-webkit-text-stroke: #0000ff;} span.S1 {font-kerning: none;} span.S2 {font-kerning: none;} span.S3 {font-kerning: none;} span.S4 {font-kerning: none; -webkit-text-stroke: 0px #535353;} span.S5 {font-kerning: none; -webkit-text-stroke: 0px #000000;} span.S6 {font-kerning: none; -webkit-text-stroke: 0px #0000ff;} /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:3 0 0 0 1 0;} @font-face {font-family:"Century Gothic"; panose-1:2 11 5 2 2 2 2 2 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} @font-face {font-family:"Helvetica Neue"; panose-1:2 0 5 3 0 0 0 2 0 4; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:-452984065 1342208475 16 0 1 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman",serif; mso-fareast-font-family:"Times New Roman";} a:link, span.MsoHyperlink {mso-style-noshow:yes; mso-style-priority:99; color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {mso-style-noshow:yes; mso-style-priority:99; color:purple; text-decoration:underline; text-underline:single;} p.msonormal0, li.msonormal0, div.msonormal0 {mso-style-name:msonormal; mso-style-unhide:no; mso-margin-top-alt:auto; margin-right:0cm; mso-margin-bottom-alt:auto; margin-left:0cm; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman",serif; mso-fareast-font-family:"Times New Roman";} p.p1, li.p1, div.p1 {mso-style-name:p1; mso-style-unhide:no; margin:0cm; margin-bottom:.0001pt; line-height:15.0pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Century Gothic",sans-serif; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; color:black;} p.p2, li.p2, div.p2 {mso-style-name:p2; mso-style-unhide:no; margin:0cm; margin-bottom:.0001pt; text-align:justify; line-height:15.0pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Century Gothic",sans-serif; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; color:black;} p.p3, li.p3, div.p3 {mso-style-name:p3; mso-style-unhide:no; margin:0cm; margin-bottom:.0001pt; text-align:justify; line-height:12.0pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Century Gothic",sans-serif; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; color:black;} p.p4, li.p4, div.p4 {mso-style-name:p4; mso-style-unhide:no; margin:0cm; margin-bottom:.0001pt; text-align:justify; line-height:12.0pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Century Gothic",sans-serif; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; color:black;} p.p5, li.p5, div.p5 {mso-style-name:p5; mso-style-unhide:no; margin:0cm; margin-bottom:.0001pt; text-align:justify; line-height:12.0pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Century Gothic",sans-serif; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman"; color:blue;} span.s2 {mso-style-name:s2; mso-style-unhide:no; color:#0000EE; text-decoration:underline; text-underline:single;} span.s3 {mso-style-name:s3; mso-style-unhide:no; mso-ansi-font-size:7.0pt; mso-bidi-font-size:7.0pt; font-family:"Century Gothic",sans-serif; mso-ascii-font-family:"Century Gothic"; mso-hansi-font-family:"Century Gothic";} span.s4 {mso-style-name:s4; mso-style-unhide:no; mso-ansi-font-size:13.0pt; mso-bidi-font-size:13.0pt; font-family:"Helvetica Neue"; mso-ascii-font-family:"Helvetica Neue"; mso-hansi-font-family:"Helvetica Neue"; color:#535353;} span.s5 {mso-style-name:s5; mso-style-unhide:no; color:black;} span.s6 {mso-style-name:s6; mso-style-unhide:no; color:blue; text-decoration:underline; text-underline:single;} span.s1 {mso-style-name:s1; mso-style-unhide:no;} span.apple-converted-space {mso-style-name:apple-converted-space; mso-style-unhide:no;} span.SpellE {mso-style-name:""; mso-spl-e:yes;} span.GramE {mso-style-name:""; mso-gram-e:yes;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page WordSection1 {size:612.0pt 792.0pt; margin:72.0pt 72.0pt 72.0pt 72.0pt; mso-header-margin:35.4pt; mso-footer-margin:35.4pt; mso-paper-source:0;} div.WordSection1 {page:WordSection1;} --> </style> <!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman",serif;} </style> <![endif]--> <meta http-equiv=Content-Style-Type content="text/css"> <meta name=CocoaVersion content=1504.83> </head> <body lang=EN-GB link=blue vlink=purple style='tab-interval:36.0pt'> <div class=WordSection1> <table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 style='border-collapse:collapse;mso-yfti-tbllook:1184;mso-padding-alt:0cm 0cm 0cm 0cm'> <tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes'> <td width=144 valign=top style='width:108.25pt;border:solid black 1.0pt; mso-border-alt:solid black .75pt;background:#DDD9C3;padding:0cm 5.4pt 0cm 5.4pt'> <p class=p1><span class=s1>Publications</span></p> </td> <td width=424 rowspan=2 valign=top style='width:317.65pt;padding:0cm 5.4pt 0cm 5.4pt'> <p class=p2><span class=s1><b>Edited Books</b></span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas and Bruno <span class=SpellE>Crispo</span> (editors).&nbsp; Engineering Secure Internet of Things Systems.&nbsp; The Institution of Engineering and Technology (The IET), October 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Joseph Morris, Benjamin Aziz, and Frederic <span class=SpellE>Oehl</span> (editors). Proceedings of the 6th International Workshop on Formal Methods. Electronic Workshops in Computing (<span class=SpellE>eWiC</span>), British Computer Society, July 2003.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Ph.D. Thesis (Download </b><a href="thesis.pdf"><span class=s2><b>Here</b></span></a><b>)</b></span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems. Ph.D. Thesis, Dublin City University, 2003.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>M.Sc. Dissertation (Download </b><a href="MyDissertation.pdf"><span class=s2><b>Here</b></span></a><b>)</b></span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; Mobile Proxies. M.Sc. Dissertation, Trinity College Dublin, 1999.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Book Chapters</b></span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; On the Security of the MQTT Protocol.&nbsp; In Engineering Secure Internet of Things Systems.&nbsp; The Institution of Engineering and Technology (The IET), October 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Paul Fremantle and Alvaro Arenas.&nbsp; A Reputation Model for the Internet of Things.&nbsp; In Engineering Secure Internet of Things Systems.&nbsp; The Institution of Engineering and Technology (The IET), October 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, Fabio Martinelli, <span class=SpellE>Marinella</span> <span class=SpellE>Petrocchi</span> and Paolo Mori. Trust Management for Grid Systems. In Trust Modelling and Management in Digital Environments: From Social Concept to System Development, IGI-Global, December 2009.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p1><span class=s1><b>Journals</b></span></p> <p class=p3><span class=s1>Paul Fremantle and Benjamin Aziz. Cloud-based Federated Identity for the Internet of Things.</span><span class=apple-converted-space>&nbsp; </span><span class=s1>Annals of Telecommunications, Springer, vol. 73(7-8): 415-427, August 2018.</span></p> <p class=p4><o:p>&nbsp;</o:p></p> <p class=p3><span class=s1>Benjamin Aziz. Towards a Mutation Analysis of IoT Protocols.&nbsp; Information and Software Technology, Elsevier, vol. 100: 183-184, 2018.</span></p> <p class=p4><o:p>&nbsp;</o:p></p> <p class=p3><span class=s1>Benjamin Aziz. Towards Open Data-Driven Evaluation of Access Control Policies.&nbsp; Computer Standards and Interfaces, Elsevier, vol. 56: 13 26, 2018.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Jean <span class=SpellE>Tajer</span>, Mo <span class=SpellE>Adda</span> and Benjamin Aziz. Detection of Flooding Attacks on Mobile Agents Using Sketch Technique and Divergence Measures.&nbsp; International Journal of Engineering Sciences and Research Technology, vol. 6(8):112-121, August 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Ali Malik, Benjamin Aziz, Mo <span class=SpellE>Adda</span> and <span class=SpellE>Chih-Heng</span> <span class=SpellE>Ke</span>.&nbsp; Optimisation Methods <span class=GramE>For</span> Fast Restoration of Software-Defined Networks.&nbsp; IEEE Access, IEEE, vol. 5: 16111-16123, August 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Jean <span class=SpellE>Tajer</span>, Mo <span class=SpellE>Adda</span> and Benjamin Aziz.&nbsp; Comparison between Divergence Measures for Anomaly Detection of Mobile Agents in IP Networks. International Journal of Wireless &amp; Mobile Networks, AIRCC Publishing Corporation, vol. 9(3), June 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; Modelling Fine-Grained Access Control Policies in Grids.&nbsp; Journal of Grid Computing, Springer, vol. 14(3): 477-493, August 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Nasser Al-<span class=SpellE>hadhrami</span>, Benjamin Aziz and <span class=SpellE>Lotfi</span> ben <span class=SpellE>Othmane</span>.&nbsp; An Incremental B-Model for RBAC-controlled Electronic Marking System. In International Journal of Secure Software Engineering: Special Issue on Agile Secure Software Development, IGI Global, vol. 7(2): 37-62, April-June 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. A Formal Model and Analysis of an IoT Protocol.&nbsp; Ad Hoc Networks, Elsevier, vol. 36(1): 49 57, January 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Carl Adams, Amanda Peart, Penny Ross and Benjamin Aziz. Temporal Stakeholder Analysis of Future Technologies: Exploring the Impact of <span class=SpellE>IoV</span>.&nbsp; Cutter IT Journal, vol. 28(7): 24-29, July 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alberto <span class=SpellE>Gugel</span>, Benjamin Aziz and Geoff Hamilton.&nbsp; Revisiting the BAN-Modified Andrew Secure RPC Protocol.&nbsp; Journal of Internet Services and Information Security, vol. 4(3): 82-96, August 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; Modelling and Refinement of Forensic Data Acquisition Specifications.&nbsp; Digital Investigation, Elsevier, vol. 11(2): 90-101, June 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and <span class=SpellE>Ioana</span> <span class=SpellE>Sporea</span>. Security and VO Management Capabilities in a Large-Scale Grid Operating System.&nbsp; Computing and Informatics, Slovak Academy of Sciences, vol. 33(2): 303-326, 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton.&nbsp; Enforcing Reputation Constraints on Business Process Workflows.&nbsp; Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 5(1):101-121, March 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Clive Blackwell and <span class=SpellE>Shareeful</span> Islam.&nbsp; A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.&nbsp; International Journal of Digital Crime and Forensics, IGI-Global, 5(2):1-22, 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Omed</span></span><span class=s1> <span class=SpellE>Khalind</span>, Julio Hernandez-Castro and Benjamin Aziz.&nbsp; A Study on the False Positive Ratio of <span class=SpellE>Stegdetect</span>.&nbsp; Digital Investigation, 9(3/4): 235-245, Elsevier, 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; An Algorithm for Trading Grid Resources in a Virtual Marketplace.&nbsp; Scalable Computing: Practice and Experience (Scientific International Journal for Parallel and Distributed Computing), West University of Timisoara, Romania, 13(4): 339-350, 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Mario <span class=SpellE>Tejedor</span>-Gonzalez.&nbsp; An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones.&nbsp; International Journal of Security, Computer Science Journals, 6(4):45-57, 2012.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Ioana</span></span><span class=s1> <span class=SpellE>Sporea</span>, Benjamin Aziz and Zak McIntyre.&nbsp; On the Availability of Anti-Forensic Tools for Smartphones.&nbsp; International Journal of Security, Computer Science Journals, 6(4): 58-64, 2012.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. Verifying a Delegation Protocol for Grid Systems. Future Generation Computer Systems: The International Journal of Grid Computing and eScience, Elsevier, 27(5): 476 485, 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz and Gheorghe <span class=SpellE>Silaghi</span>. Reputation Management in Collaborative Computing Systems. Journal of Security and Communication Networks, 3(6): 546 564, John Wiley and Sons, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Simon Foley, John Herbert and Garret <span class=SpellE>Swart</span>. Configuring Storage Area Networks Using Mandatory Security. Journal of Computer Security, 17(2):191-210, IOS Press, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems Using Process Calculi. International Journal of Foundations of Computer Science, 18(3):593-618, World Scientific, 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Simon Foley, John Herbert and Garret <span class=SpellE>Swart</span>. Reconfiguring Role Based Access Control Policies Using Risk Semantics. Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration, 15(3):261-273, IOS Press, 2006.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Geoff Hamilton and David <span class=SpellE>Gray</span>. A Static Analysis of Cryptographic Processes: The Denotational Approach. Journal of Logic and Algebraic Programming, 64(2):285-320, Elsevier, August 2005.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Conferences</b></span></p> <p class=p3><span class=SpellE><span class=s1>Gulsum</span></span><span class=s1> <span class=SpellE>Akkuzu</span>, Benjamin Aziz and Han Liu.&nbsp; </span><span style='mso-fareast-font-family:"Times New Roman";mso-fareast-theme-font:minor-fareast'>Feature Analysis on the Containment Time for Cybersecurity Incidents</span><span class=s1>.&nbsp; In Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, ICMLC 2018, Chengdu, China, July 2018 (to appear in IEEE)<o:p></o:p></span></p> <p class=p3><span class=s1><o:p>&nbsp;</o:p></span></p> <p class=p3><span class=s1>Ali Malik, Benjamin Aziz and Mo <span class=SpellE>Adda</span>.&nbsp; Towards Filling <span class=GramE>The</span> Gap of Routing Changes in Software-Defined Networks.&nbsp; In Proceedings of the Future Technologies Conference 2018 (FTC 2018), Vancouver, BC, Canada, November 2018 (to appear in Springer)</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Ali Malik, Benjamin Aziz, <span class=SpellE>Chih-Heng</span> <span class=SpellE>Ke</span>, Han Liu and Mo <span class=SpellE>Adda</span>.&nbsp; Virtual Topology Partitioning Towards <span class=GramE>An</span> Efficient Failure Recovery of Software Defined Networks.&nbsp; In Proceedings of the 16</span><span class=s3><sup><span style='font-size:7.0pt'>th</span></sup></span><span class=s1> International Conference on Machine Learning and Cybernetics (ICMLC), pages 646-651, IEEE, Ningbo, China, July, 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Jean <span class=SpellE>Tajer</span>, Mo <span class=SpellE>Adda</span> and Benjamin Aziz.&nbsp; Flooding Attacks Detection of Mobile Agents in IP Networks.&nbsp; Fourth International Conference on Computer Networks &amp; Communications (CCNET-2017), pages 1-12, AIRCC Publishing Corporation, Dubai, UAE, April 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Ali Malik, Benjamin Aziz and Mohamed Bader-El-Den.&nbsp; Finding Most Reliable Paths <span class=GramE>For</span> Software Defined Networks.&nbsp; In Proceedings of the 13</span><span class=s3><sup><span style='font-size:7.0pt'>th</span></sup></span><span class=s1> International Wireless Communications and Mobile Computing Conference (IWCMC 2017), pages 1309-1314, IEEE, Valencia, Spain, June 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Paul Fremantle, Benjamin Aziz and Tom Kirkham.&nbsp; Enhancing IoT Security and Privacy with Distributed Ledgers - a Position Paper.&nbsp; In Proceedings of the 2</span><span class=s3><sup><span style='font-size:7.0pt'>nd </span></sup></span><span class=s1>International Conference of Internet of Things, Big Data and Security, Porto, Portugal, pages 344-349, SCITEPRESS  Science and Technology Publications, <span class=SpellE>Lda</span><span class=GramE>. ,</span> April 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Jean <span class=SpellE>Tajer</span>, Mo <span class=SpellE>Adda</span> and Benjamin Aziz.&nbsp; New Computing Model for Securing Mobile Agents in IP Networks.&nbsp; In Proceedings of the 2</span><span class=s3><sup><span style='font-size:7.0pt'>nd </span></sup></span><span class=s1>International Conference of Internet of Things, Big Data and Security (<span class=SpellE>IoTBDS</span> 2017), Porto, Portugal, pages 232-238, SCITEPRESS  Science and Technology Publications, <span class=SpellE>Lda</span><span class=GramE>. ,</span> April 2017.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Paul Fremantle and Benjamin Aziz. <span class=SpellE>OAuthing</span>: Privacy-enhancing Federation for the Internet of Things.&nbsp; In Proceedings of the 2</span><span class=s3><sup><span style='font-size:7.0pt'>nd</span></sup></span><span class=s1> International Conference on Cloudification of the Internet of Things, Paris, France, IEEE, pages 17-22, November 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Paul Fremantle, Rui Wei and Alvaro Arenas. A Utility-based Reputation Model for the Internet of Things.&nbsp; In Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016), Ghent, Belgium, vol. 471, pages 261-275, May 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Mohamed Bader and <span class=SpellE>Cerana</span> Hippolyte.&nbsp; Search-based SQL Injection Attacks Testing using Genetic Programming.&nbsp; In Proceedings of the 19th European Conference on Genetic Programming (<span class=SpellE>EuroGP</span> 2016), Porto, Portugal, LNCS 9594:183 -198, Springer, March 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Tom Kirkham, Arnab Sinha, Nikos <span class=SpellE>Parlavantzas</span>, Bartosz <span class=SpellE>Kryza</span>, Paul Fremantle, Kyriakos <span class=SpellE>Kritikos</span> and Benjamin Aziz.&nbsp; Privacy Aware on-Demand Resource Provisioning for IoT Data Processing.&nbsp; In Proceedings of the 2nd EAI International Conference on IoT as a Service (<span class=SpellE>IoTaaS</span> 2015), Rome, Italy, LNICST, 170:</span><span class=s4><span style='font-size:13.0pt'> </span></span><span class=s1>87-95, Springer, October 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Omed</span></span><span class=s1> <span class=SpellE>Khalind</span> and Benjamin Aziz.&nbsp; A Better Detection of 2LSB Steganography via Standard Deviation of the Extended Pairs of Values.&nbsp; In Proceedings of the 2015 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9497, Baltimore, USA, April 2015 (won best paper award).</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Omed</span></span><span class=s1> <span class=SpellE>Khalind</span> and Benjamin Aziz.&nbsp; LSB Steganography with Improved Embedding Efficiency and Undetectability.&nbsp; In Proceedings of the 4th International Conference on Signal &amp; Image Processing (SIP 2015), Zurich, Switzerland, AIRCC CSCP, January 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; A Formal Model and Analysis of the MQ Telemetry Transport Protocol.&nbsp; In Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES 2014), Fribourg, Switzerland, IEEE, September 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Omed</span></span><span class=s1> <span class=SpellE>Khalind</span> and Benjamin Aziz.&nbsp; Detecting 2LSB Steganography Using Extended Pairs of Values Analysis.&nbsp; In Proceedings of the 2014 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9120, Baltimore, USA, May 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton.&nbsp; Reputation-Controlled Business Process Workflows.&nbsp; In Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, Germany, pages 42-51, IEEE, September 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; On Formalising Policy Refinement in Grid Virtual Organisations.&nbsp; In Proceedings of the 11th International Conference on Software Engineering Research, Management and Applications (SERA 2013), Prague, Czech Republic, Studies in Computational Intelligence, 496:17-31, Springer, August 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Clive Blackwell, <span class=SpellE>Shareeful</span> Islam and Benjamin Aziz.&nbsp; Implementation of Digital Forensics Investigations Using a Goal-Driven Approach for a Questioned Contract.&nbsp; In Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, USA, IFIP Advances in Information and Communication Technology 410: 153-167, Springer, January 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; Towards Goal-Driven Digital Forensics Investigations.&nbsp; In Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyfor-12), London, UK, May 2012.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, <span class=SpellE>Szymon</span> Maj and Brian Matthews. An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper).&nbsp; In Proceedings of the 4th European Conference <span class=SpellE>ServiceWave</span> 2011, Poznan, Poland, LNCS 6994: 112-121, Springer, October 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz.&nbsp; Correcting a Delegation Protocol for Grids.&nbsp; In Proceedings of the 8th International Conference on Trust, Privacy &amp; Security in Digital Business (<span class=SpellE>TrustBus</span> 2011), Toulouse, France, LNCS 6863: 198-209, Springer, August 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Shirley Crompton and Michael Wilson.&nbsp; A Metadata Model for Data Centric Security.&nbsp; In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 21-28, Springer, June 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas and Michael Wilson.&nbsp; SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements.&nbsp; In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 29-36, Springer, June 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro E. Arenas, Benjamin Aziz, Juan <span class=SpellE>Bicarregui</span> and Michael D. Wilson. An Event-B Approach to Data Sharing Agreements. In Proceedings of the 8th International Conference on Integrated Formal Methods (<span class=SpellE>iFM</span> 2010), Nancy, France, LNCS 6396: 28-42, Springer, October 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej <span class=SpellE>Artac</span>, Ales <span class=SpellE>Cernivec</span> and Philip Robinson. Management of Security Policies in Virtual Organisations. In Proceedings of the 2010 International Conference on Security and Cryptography (<span class=SpellE>Secrypt</span> 2010), Athens, Greece, July 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Shirley Crompton and Brian Matthews. From Community to Resource Policies: A Tool for the Automatic Refinement of VO Policies. In Proceedings of the 2009 UK e-Science All Hands Meeting, Oxford, UK, December 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. Detecting Man-in-the-Middle Attacks by Precise Timing. In Proceedings of The Third International Conference on Emerging Security Information, Systems and Technologies (<span class=SpellE>Securware</span> 2009), Athens, Greece, 81-86, IEEE Computer Society, June 2009 (won best paper award).</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Federico <span class=SpellE>Stagni</span>, Alvaro Arenas, Benjamin Aziz and Fabio Martinelli. On Usage Control in Data Grids. In Proceedings of the 3rd IFIP International Conference on Trust Management (TM'09), Purdue University, West Lafayette, USA, IFIP Advances in Information and Communication Technology, vol. 300/2009, 99-116, June 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Syed Naqvi, Philippe <span class=SpellE>Massonet</span>, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi and Giovanni Cortese. Fine-grained continuous usage control of <span class=GramE>service based</span> Grids the <span class=SpellE>GridTrust</span> Approach. In Proceedings of <span class=SpellE>ServiceWave</span> 2008, Madrid, Spain, December 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, Philippe <span class=SpellE>Massonet</span> and Christophe <span class=SpellE>Ponsard</span>. A Goal-Oriented Approach to Grid Security Requirements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Michael D. Wilson, Alvaro Arenas, Brian M. Matthews, Shirley Crompton and Benjamin Aziz. Security Policies in Scientific Data Sharing Agreements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Lorenzo Blasi, Alvaro Arenas, Benjamin Aziz, Paolo Mori, Umberto <span class=SpellE>Rovati</span>, Bruno <span class=SpellE>Crispo</span>, Fabio Martinelli and Philippe <span class=SpellE>Massonet</span>. A Secure Environment for Grid-Based Supply Chains. In Proceedings of the <span class=SpellE>eChallenges</span> e-2008 Conference, Stockholm, Sweden, October 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz and Gheorghe Cosmin <span class=SpellE>Silaghi</span>. Reputation Management in Grid-based Virtual Organisations. In Proceedings of the 3rd International Conference on Security and Cryptography (<span class=SpellE>Secrypt</span> 2008), Porto, Portugal, INSTICC, July 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria <span class=SpellE>Matteucci</span> and Paolo Mori. Controlling Usage of Business Processes through Fine-Grained Security Policies. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (<span class=SpellE>TrustBus</span> 2008), Turin, Italy, LNCS 5185:100-117, Springer, September 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Juan <span class=SpellE>Bicarregui</span>, Alvaro Arenas, Benjamin Aziz, Philippe <span class=SpellE>Massonet</span> and Christophe <span class=SpellE>Ponsard</span>. Towards Modelling Obligations in Event-B. In Proceedings of the ABZ 2008 Conference, London, UK, LNCS 5238:181-194, Springer, September 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. Measuring the Speed of Information Leakage in Mobile Processes. In Proceedings of the 11th International Conference on Algebraic Methodology and Software Technology (AMAST'06), <span class=SpellE>Kuressaare</span>, Estonia, LNCS 4019:36-50, Springer, July 2006.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, David <span class=SpellE>Gray</span> and Geoff Hamilton. A Static Analysis of PKI-based Systems. In Proceedings of the 9th Italian Conference on Theoretical Computer Science (ICTCS'05), <span class=SpellE>Certosa</span> di <span class=SpellE>Pontignano</span> (Siena), Italy, LNCS 3701:51-65, Springer, October 2005.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Garret <span class=SpellE>Swart</span>, Benjamin Aziz, Simon Foley and John Herbert. Trading Off Security in a Service Oriented Architecture. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, LNCS 3654:295-309, Springer-Verlag, August 2005.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Garret <span class=SpellE>Swart</span>, Benjamin Aziz, Simon Foley and John Herbert. Automatic Configuration of Services for Security, Bandwidth, Throughput and Availability. In Forum proceedings of the 2nd International Conference on Service Oriented Computing (IC-SOC'04), New York, USA, IBM Technical Report RA221, November 2004.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Simon N. Foley, John Herbert and Garret <span class=SpellE>Swart</span>. Configuring Storage-Area Networks for Mandatory Security. In Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, <span class=SpellE>Sitges</span>, Spain, 144:357-370, Kluwer, July 2004.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Bruno Blanchet and Benjamin Aziz. A Calculus for Secure Mobility. In Proceedings of the 8th Asian Computing Science Conference (Asian'03), Mumbai, India, LNCS 2896:188-204, Springer-Verlag, December 2003.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, David <span class=SpellE>Gray</span>, Geoff Hamilton, Frederic <span class=SpellE>Oehl</span>, James Power, and David Sinclair. Implementing Protocol Verification for E-Commerce. In Proceedings of the 2001 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet (SSGRR'01), L Aquila, Italy, August 2001.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Symposia</b></span></p> <p class=p3><span class=s1>Richard Dennis, Gareth <span class=SpellE>Owenson</span> and Benjamin Aziz.&nbsp; A Temporal Blockchain: A Formal Analysis.&nbsp; In Proceedings of the 6th International Symposium on Security in Collaboration Technologies and Systems.&nbsp; Orlando, USA, 430-437, IEEE, November 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=SpellE><span class=s1>Omed</span></span><span class=s1> <span class=SpellE>Khalind</span> and Benjamin Aziz.&nbsp; Single-Mismatch 2LSB Embedding Method of Steganography.&nbsp; In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013), Athens, Greece, 283 - 286, IEEE, December 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. Application of Formal Analysis to Enhancing Trust in a Complex Grid-based Operating System. In Proceedings of the 3rd International ACM SIGSOFT Symposium on Architecting Critical Systems (ISARCS 2012), <span class=SpellE>Bertinoro</span>, Italy, 41-50, <span class=GramE>ACM,&nbsp; June</span> 2012.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro E. Arenas and Michael Wilson.&nbsp; Model-based Refinement of Security Policies in Collaborative Virtual Organisations. In Proceedings of the 3rd International Symposium on Engineering Secure Software and Systems (ESSOS 11), Madrid, Spain, LNCS 6542: 1-14, Springer, February 2011.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Juan <span class=SpellE>Bicarregui</span>, Christophe <span class=SpellE>Ponsard</span> and Philippe <span class=SpellE>Massonet</span>. From Goal-Oriented Requirements to Event-B Specifications. In Proceedings of the First NASA Formal Methods Symposium, California, USA, 96-105, NASA, April 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, Juan <span class=SpellE>Bicarregui</span>, Brian Matthews and Erica Yang. Modelling Security Properties in a Goal-based Operating System with Anti-Goals. In Proceedings of the Symposium on Requirements Engineering for Information Security (SRIES 2008), Barcelona, Spain, 1429-1436, IEEE Computer Society, March 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. In Proceedings of the 2nd International Symposium on Distributed Objects and Applications (DOA'00), Antwerp, Belgium, 295-304, IEEE Press, September 2000.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Workshops</b></span></p> <p class=p3><span class=SpellE><span class=s1>Gulsum</span></span><span class=s1> <span class=SpellE>Akkuzu</span> and Benjamin Aziz.&nbsp; Data-Driven Chinese Walls.&nbsp; In Proceedings of the 2018 Imperial College Computing Student Workshop, London, UK, <span class=SpellE>OpenAccess</span> Series in Informatics, Schloss <span class=SpellE>Dagstuhl</span>, September 2018 (to appear)<o:p></o:p></span></p> <p class=p3><span class=s1><o:p>&nbsp;</o:p></span></p> <p class=p3><span class=s1>Ali Malik, Benjamin Aziz and <span class=SpellE>Chih-Heng</span> Ke.&nbsp; THRIFTY: Towards High Reduction In Flow Table <span class=SpellE>memorY</span>.&nbsp; In Proceedings of the 2018 Imperial College Computing Student Workshop, London, UK, <span class=SpellE>OpenAccess</span> Series in Informatics, Schloss <span class=SpellE>Dagstuhl</span>, September 2018 (to appear)<o:p></o:p></span></p> <p class=p3><span class=s1><o:p>&nbsp;</o:p></span></p> <p class=p3><span class=s1>Benjamin Aziz, Ali Malik and <span class=SpellE>Jeyong</span> Jung.&nbsp; Check Your Blind Spots: A New Cyber-Security Metric for Measuring Incident Response Readiness.&nbsp; In Proceedings of the 4th International Workshop on Risk Assessment and Risk-driven Quality Assurance (RISK 2016), Graz, Austria, LNCS 10224: 19-33, Springer, October 2016.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, Philippe <span class=SpellE>Massonet</span> and Christophe <span class=SpellE>Ponsard</span>. Goal-Oriented Requirement Engineering Support for Business Continuity Planning.&nbsp; In Proceedings of the 2nd International Workshop on Conceptual <span class=SpellE>Modeling</span> in Requirements Engineering and Business Analysis (MReBA'15), Stockholm, Sweden, LNCS 9382: 259-269, Springer, December 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Nasser Al-<span class=SpellE>Hadhrami</span>, Benjamin Aziz, Shantanu <span class=SpellE>Sardesai</span> and <span class=SpellE>Lotfi</span> ben <span class=SpellE>Othmane</span>. Incremental Development of RBAC-controlled e-Marking System Using the B Method. In Proceedings of the 1st International Workshop on Agile Secure Software Development, Toulouse, France, 532-539, IEEE, August 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Paul Fremantle, Jacek <span class=SpellE>Kopecky</span>, Benjamin Aziz. Web API Management Meets the Internet of Things. In Proceedings of the 2015 Services and Applications over Linked APIs and Data Workshop (SALAD2015), <span class=SpellE>Portoroz</span>, Slovenia, CEUR Workshop Proceedings, vol. 1359, 1-9, June 2015.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Paul Fremantle, Benjamin Aziz, Jacek <span class=SpellE>Kopecky</span> and Philip Scott.&nbsp; Federated Identity and Access Management for the Internet of Things.&nbsp; In Proceedings of the 2014 International Workshop on Secure Internet of Things (<span class=SpellE>SIoT</span> 2014), Wroclaw, Poland, 10-17, IEEE, September 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Clive Blackwell.&nbsp; Using Security Patterns for Modelling Security Capabilities in a Grid OS.&nbsp; In Proceedings of the 3rd International Workshop on <span class=SpellE>Cyberpatterns</span>: From Big Data to Reusable Knowledge, Attack and Forensic Patterns part of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), Oxford, UK, 422-427, IEEE April 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Clive Blackwell.&nbsp; Use of KAOS in Operational Digital Forensic Investigations. In Proceedings of the 2nd International Workshop on <span class=SpellE>Cyberpatterns</span>: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK, July 2013.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno <span class=SpellE>Crispo</span> and Silvio <span class=SpellE>Causetti</span>. A Secure and Scalable Grid-based Content Management System. In Proceedings of the 5th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2010), Krakow, Poland, 404-409, IEEE Computer Society, February 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Shirley Crompton, Benjamin Aziz and Michael Wilson. Sharing Scientific Data: Scenarios and Challenges. In Proceedings of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz and Juan <span class=SpellE>Bicarregui</span>. Policy Refinement in Virtual Organisations. In Proceedings of the 2008 Formal Aspects of Virtual Organisations Workshop (FAVO2008), Turku, Finland, May 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Juan <span class=SpellE>Bicarregui</span>, Brian Matthews and Erica Yang. A Formal Security Requirements Model for a Grid-based Operating System. In Proceedings of the BCS-FACS 2007 Christmas Workshop: Formal Methods in Industry, London, UK, Electronic Workshops in Computing (<span class=SpellE>eWiC</span>), BCS, December 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Alvaro Arenas, Benjamin Aziz, Juan <span class=SpellE>Bicarregui</span> and Brian Matthews. Managing Conflicts of Interest in Virtual Organisations. In Proceedings of the 3rd International Workshop on Security and Trust Management (STM'07), Dresden, Germany, ENTCS 197(2):45-56, Elsevier, September 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. A Semiring-based Quantitative Analysis of Mobile Systems. In Proceedings of the 3th International Workshop on Software Verification and Validation (SVV'05), Manchester, UK, ENTCS 157(1):3-21, Elsevier, May 2006.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz, Geoff Hamilton and David <span class=SpellE>Gray</span>. A Denotational Approach to the Static Analysis of Cryptographic Processes. In Proceedings of the International Workshop on Software Verification and Validation (SVV'03), Mumbai, India, ENTCS 118:19-36, Elsevier, December 2005.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>David <span class=SpellE>Gray</span>, Benjamin Aziz and Geoff Hamilton. SPIKY: A Nominal Calculus for Modelling Protocols that use PKIs. In Proceedings of the International Workshop on Security Analysis of Systems: Formalism and Tools (SASYFT'04), Orleans, France, Technical Report RR-2004-11, <span class=SpellE>Laboratoire</span> <span class=SpellE>d'Informatique</span> <span class=SpellE>Fondamentale</span> <span class=SpellE>d'Orleans</span>, June 2004.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. A Privacy Analysis for the Pi-calculus: The Denotational Approach. In Proceedings of the 2nd Workshop on the Specification, Analysis and Validation for Emerging Technologies (SAVE'02), Copenhagen, Denmark, July 2002.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. A Denotational Semantics for the Pi-Calculus. In Proceedings of the 5th Irish Workshop in Formal Methods (IWFM'01), Trinity College, Dublin, Ireland, Electronic Workshops in Computing (<span class=SpellE>eWiC</span>), BCS, July 2001.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Posters</b></span></p> <p class=p3><span class=s1>Benjamin Aziz, Philippe <span class=SpellE>Massonet</span> and Christophe <span class=SpellE>Ponsard</span>.&nbsp; A Formal Model for Forensic Storage Media Preparation Tools. In Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, August 2014.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Adam Barker, Benjamin Aziz, Alvaro Arenas, Ian Johnson, Brian Matthews and Erica Y. Yang. Trust Management of Dynamic Virtual Organisations in <span class=SpellE>XtreemOS</span>, UK e-Science 2009 All Hands Meeting, December 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Demos</b></span></p> <p class=p3><span class=s1>Paul Fremantle and Benjamin Aziz. Privacy-enhancing Federated Middleware for the Internet of Things. In the 17</span><span class=s3><sup><span style='font-size:7.0pt'>th</span></sup></span><span class=s1> International ACM/IFIP/USENIX Middleware Conference (Middleware 2016), Trento, Italy, December 2016.</span></p> <p class=p2><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Technical Reports</b></span></p> <p class=p3><span class=s1>Benjamin Aziz, Alvaro Arenas, Ian Johnson, Erica Yang, Matej <span class=SpellE>Artac</span>, Ales <span class=SpellE>Cernivec</span>, Philip Robinson and Yvon <span class=SpellE>Jegou</span>. Trust Management in the <span class=SpellE>XtreemOS</span> Operating System. <span class=SpellE>XtreemOS</span> Technical Report 5, 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Federico <span class=SpellE>Stagni</span>, Alvaro Arenas and Benjamin Aziz. On Usage Control in Data Grids. <span class=SpellE>CoreGrid</span> Technical report TR-0154, STFC RAL, Oxfordshire, UK, 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. A Static Analysis of the Applied Pi-Calculus. Technical report 2006/15, Imperial College London, London, UK, 2006.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems using Process Calculi. Technical report 2006/14, Imperial College London, London, UK, 2006.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. Technical report TCD-CS-2000-57, Trinity College, Dublin, Ireland, December 2000.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Benjamin Aziz. Mobile Proxies. Technical report TCD-CS-1999-60, Trinity College, Dublin, Ireland, December 1999.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>Project Deliverables</b></span></p> <p class=p3><span class=s1>Methodology and Design Alternatives for Federation and Interoperability. EU FP6 Project <span class=SpellE>XtreemOS</span> Deliverable D3.5.15, 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Methodology and Design Alternatives for Trust Services in <span class=SpellE>XtreemOS</span>. EU FP6 Project <span class=SpellE>XtreemOS</span> Deliverable D3.5.9, 2010.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Fourth Specification of the Security and VO Management Services. EU FP6 Project <span class=SpellE>XtreemOS</span> Deliverable D3.5.13, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Evaluation Report. EU FP6 Project <span class=SpellE>GridTrust</span> Deliverable D5.3, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>VO Management System. EU FP6 Project <span class=SpellE>GridTrust</span> Deliverable D4.3, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>A Framework for Reasoning about Trust and Security in Grids at Requirement and Application Levels. EU FP6 Project <span class=SpellE>GridTrust</span> Deliverable D4.1, 2009.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Methodologies and tools for data sharing agreement infrastructure. EU FP7 Consequence Deliverable D2.1, 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Models and Framework for Metadata Generation and Policy Infrastructure. EU FP7 Consequence Deliverable D3.1, 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Requirements Specification for the Sharing Sensitive Scientific Data Test Bed. EU FP7 Consequence Deliverable D6.1, 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Integration of TSP Policies in the UCON Model and Integration of the UCON Model with the VO Model. EU FP6 <span class=SpellE>GridTrust</span> Deliverable D3.3, 2008.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Reasoning about Trust and Security Properties in Dynamic Virtual Organisations: State of the Art. EU FP6 Project <span class=SpellE>GridTrust</span> Deliverable D2.1, 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Reasoning about Trust and Security Properties in Virtual Organisations. EU FP6 Project <span class=SpellE>GridTrust</span> Deliverable D2.2, 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p3><span class=s1>Report on Formal Analysis of Security Properties. EU FP6 project <span class=SpellE>XtreemOS</span> Deliverable D3.5.6, 2007.</span></p> <p class=p3><span class=s1>&nbsp;</span></p> <p class=p2><span class=s1><b>News Articles</b></span></p> <p class=p5><span class=s5> Mean blind spot leaves organisations vulnerable to <span class=SpellE>cyber attack</span>.&nbsp; In <span class=SpellE>UoP</span> News, March 21, 2017 (<a href="http://uopnews.port.ac.uk/2017/03/21/mean-blind-spot-leaves-organisations-vulnerable-to-cyber-attack/"><span class=s6>http://uopnews.port.ac.uk/2017/03/21/mean-blind-spot-leaves-organisations-vulnerable-to-cyber-attack/</span></a>)</span></p> </td> </tr> <tr style='mso-yfti-irow:1;mso-yfti-lastrow:yes'> <td width=145 valign=top style='width:109.0pt;padding:0cm 5.4pt 0cm 5.4pt'> <p class=p2><span class=s1>&nbsp;</span></p> </td> </tr> </table> <p class=p2><span class=s1>&nbsp;</span><span style='mso-fareast-font-family: "Times New Roman";mso-fareast-theme-font:minor-fareast'><o:p></o:p></span></p> </div> </body> </html>