The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Benjamin Aziz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Benjamin Aziz
    Measuring the Speed of Information Leakage in Mobile Processes. [Citation Graph (0, 0)][DBLP]
    AMAST, 2006, pp:36-50 [Conf]
  2. Bruno Blanchet, Benjamin Aziz
    A Calculus for Secure Mobility. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2003, pp:188-204 [Conf]
  3. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
    Configuring Storage Area Networks for Mandatory Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:357-370 [Conf]
  4. Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert
    Trading Off Security in a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:295-309 [Conf]
  5. Benjamin Aziz, Christian Damsgaard Jensen
    Adaptability in CORBA: The Mobile Proxy Approach. [Citation Graph (0, 0)][DBLP]
    DOA, 2000, pp:295-304 [Conf]
  6. Benjamin Aziz, David Gray, Geoff W. Hamilton
    A Static Analysis of PKI-Based Systems. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2005, pp:51-65 [Conf]
  7. Benjamin Aziz, Geoff W. Hamilton
    A Denotational Semantics for the Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    IWFM, 2001, pp:- [Conf]
  8. Benjamin Aziz
    A Semiring-based Quantitative Analysis of Mobile Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:1, pp:3-21 [Journal]
  9. Benjamin Aziz, Geoff W. Hamilton, David Gray
    A Denotational Approach to the Static Analysis of Cryptographic Processes. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:19-36 [Journal]
  10. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
    Reconfiguring Role Based Access Control policies using risk semantics. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:261-273 [Journal]
  11. Benjamin Aziz, Geoff W. Hamilton, David Gray
    A static analysis of cryptographic processes: the denotational approach. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:285-320 [Journal]

  12. Modelling Security Properties in a Grid-based Operating System with Anti-Goals. [Citation Graph (, )][DBLP]


  13. A Secure and Scalable Grid-Based Content Management System. [Citation Graph (, )][DBLP]


  14. Towards Modelling Obligations in Event-B. [Citation Graph (, )][DBLP]


  15. Reputation Management in Grid-based Virtual Organisations. [Citation Graph (, )][DBLP]


  16. Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. [Citation Graph (, )][DBLP]


  17. Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. [Citation Graph (, )][DBLP]


  18. Detecting Man-in-the-Middle Attacks by Precise Timing. [Citation Graph (, )][DBLP]


  19. Managing Conflicts of Interest in Virtual Organisations. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002