2012 Research prototype of
cloud security assurance
analysis, transferred to IBM as part of the
IBM PowerSC Trusted Surveyor
automated isolation analysis for infrastructure clouds
, used in an IBM analysis of a global financial institution's in-house cloud.
anonymous credential system on a standard Java Card
, cited by, e.g., the
Handbook of EID Security
as feasibility proof for this protocol class on eID cards.
security proof of a
(WSFPI), basis for industry interoperability, recommendations adopted by standard, proof conditions transferred as test suite to TFIM.
security analysis of
1.1 and 2.0
, adopted in standard and acknowledged by OASIS, major identity federation standard, basis of ~50 industry and open-source software products.
2003 Design and research prototype of
IBM Tivoli Federated Identity Manager (TFIM)
, transferred to IBM Tivoli, first production deployment with global telecom operator, 50 Million seats.
2002 Design and research prototype of the
Dynamic Attribute (DynADI) Entitlement Service
, transferred to
IBM Tivoli Access Manager (TAM)
You are here:
Scroll to Top
Choice Architecture for Information Security
Secure and Privacy-Preserving eID
Cloud Security Verification
Cloud topologies are complex!
Infrastructure Cloud Information Flow Analysis
Smart Identity Card
My University Page
Computing Science Research at Newcastle University
IBM Research - Zurich, Security
Copyright © 2012 Thomas Gross. Designed by