2015-18 PRISMACLOUDS (EU H2020).
Newcastle principal investigator. Privacy and integrity methods for clouds.
2015 International Research Collaboration Award.
Principal Investigator. Experimentation in the Science of Cyber Security, with CMU.
2015-18 ACE-CSR PhD.
Co-investigator. Modelling for Defending against Influencing Attackers.
2014-18 Doctoral Training Centre Cloud Computing for Big Data (EPSRC)
. Supervisor. PhD programme incl. security and privacy.
2014-18 Doctoral Training Centre Digital Civics (EPSRC)
. Supervisor, lead security and privacy. PhD programme incl. security and privacy for digital interaction.
2014 Equipment Grant.
Principal investigator. Cyber Security Incident Simulation Room.
2014 Equipment Grant.
Principal investigator. Physical artifacts for teaching security and cryptography.
2014-17 ACE-CSR PhD
. Principal investigator. Attack Scalability in Identity Federation.
2013-16 Academic Centre of Excellence in Cyber Security Research (ACE-CSR)
. Co-investigator, director.
(EU FP7, Call 6).
Newcastle principal investigator, security and privacy model checking, compositional reasoning, usable privacy.
2012-2014 PRISTINE (
Principal investigator, usable and experience-centric privacy for social inclusion.
2012 EPSRC Equipment Grants. Cloud security assurance and cyber security.
2012-15 Research Institute in the Science of Cyber Security (EPSRC RISCS).
Co-investigator. Choice architecture for information security (ChAISe).
2012 EPSRC Cyber Security Research Network.
(EU FP7, Call 5)
Ccloud security validation.
2010-11 Cloud Security Assurance (IBM STG Joint Program) Co-investigator, information flow analysis and verification of virtualized infrastructures.
(EU FP7, Call 4)
, efficiency of anonymous credentials and realization of the first anonymous credential system on Java Card.
2007 Identity 2.0 (IBM Tivoli Joint Program/CIO Technology Program) Principal investigator.
2003-06 Federated Identity Management (IBM Tivoli Joint Program), security analysis of federated identity management (SAML 1.1/2.0, WS-Federation) and development of
IBM Tivoli Federated Identity Manager (TFIM)
You are here:
Scroll to Top
Choice Architecture for Information Security
Secure and Privacy-Preserving eID
Cloud Security Verification
Cloud topologies are complex!
Infrastructure Cloud Information Flow Analysis
Smart Identity Card
My University Page
Computing Science Research at Newcastle University
IBM Research - Zurich, Security
Copyright © 2012 Thomas Gross. Designed by