Network of Excellence on Engineering Secure Future Internet Software Services and Systems


Enter the Program

Username:
Password:

NESSoS Mobility Program

The mobility of network fellows within the NESSoS network of excellence is a mechanism that supports the integration of activities across various sites. It brings together researchers working on related topics; it drives knowledge exchange and knowledge generation through union and diversity. It increases the capability of joint cooperation among researchers.

Mobility Grant Applications

To apply for a Mobility Grant, please access the NESSoS Mobility Program using your account. If you are new to the NESSoS Mobility Program, please create your own account first.

Mobility actions

Please, find below information about actions performed within the NESSoS Mobility Program.

All partners | CNR | ATOS | ETH Zurich | IMDEA | INRIA | KUL | LMU | SIEMENS | SINTEF | UDE | UMA | UNITN

Starting date Participant From To Duration Funded by
2014-02-17 Busch, Marianne LMU CNR 2 days NeSSOS
Summary
The aim was to integrate Innsbruck's tool CoSeRMaS (http://cosermas.q-e.at/) into the Service Development Environment (SDE http://nessos-project.eu/sde). The SDE is the tool workbench for NESSoS.
The integration was finished in time. We report on it in deliverable D2.5.

In Innsbruck, I also presented LMU's work for NESSoS, i.e., the SecEval Framework and UWE 's security extensions.
 
Starting date Participant From To Duration Funded by
2013-11-18 Moyano, Francisco UMA UDE 5 days NESSoS
Summary
We worked on an integrated method for eliciting requirements (including trust requirements) for FI scenarios. We also started a new work on integrating trust in the problem frames notation.
 
Starting date Participant From To Duration Funded by
2013-11-18 Tran, Le Minh Sang UNITN UDE 5 days NeSSOS
Summary
The goal of this visit is to discuss the contributions of D6.5 which aims to deliver a common framework for security requirements. This method integrates proposed artifacts from WP partners
 
Starting date Participant From To Duration Funded by
2013-10-06 Moyano, Francisco UMA INRIA 25 days NESSoS
Summary
We finished the implementation of the first version of the trust and reputation framework.
 
Starting date Participant From To Duration Funded by
2013-04-14 Nguyen, Viet UNITN KUL 81 days NeSSOS
Summary
I have collected vulnerability data for Chrome and Firefox to build a prediction models for these two application. The prediction models are based on text classification technique. The details have been put in D9.4
 
Starting date Participant From To Duration Funded by
2013-01-08 Moyano, Francisco UMA INRIA 90 days NeSSOS
Summary
The goal of this stay was to research on how trust could be included as part of Kevoree in order to enhance self-adaptive systems with trust-based reconfiguration capabilities.
 
Starting date Participant From To Duration Funded by
2012-10-14 Moyano, Francisco UMA SIEMENS 6 days NeSSOS
Summary
The goal of this visit was to clear up how trust and reputation services could be used in the context of SOA and service-oriented software. We reflected on which approach could be suitable for several e-Health scenarios, such as patient consent or medical databases lookup. Several guidelines for further research were given in this domain.
 
Starting date Participant From To Duration Funded by
2012-10-08 Erdogan, Gencer SINTEF SIEMENS 14 days
Summary
In this work we address a gap between security risk analysis and security testing in the context of Risk-driven Security Testing (RST) and Test-driven Security Risk Analysis (TSR). The particular gap we have looked into is the challenge of systematically identifying appropriate security tests with respect to security risk analysis.
 
Starting date Participant From To Duration Funded by
2012-09-26 Decat, Maarten KUL UNITN 3 days
Summary
This visit happened in the context of a paper, co-authored by KUL and UNITN, about authorization and access control in Software-as-a-Service (SaaS) applications.
 
Starting date Participant From To Duration Funded by
2012-09-01 Garcia de Dios, Miguel Angel IMDEA ETH Zurich 182 days
Summary
This mobility action is still ongoing. The main objectives are to apply the ActionGUI methodology and tools to the NESSoS EHealth Use Case and to write a joint paper on the lessons learned.
 
Starting date Participant From To Duration Funded by
2012-09-01 Ortiz Jaureguizar, Gonzalo IMDEA ETH Zurich 182 days IMDEA
Summary
This mobility action is still ongoing. The main objectives are to further develop the ActionGUI tools (including model editors and code generators) and to launch joint open projects associated to the ActionGUI methodology and tools.
 
Starting date Participant From To Duration Funded by
2012-09-01 Dania, Carolina IMDEA ETH Zurich 182 days
Summary
This mobility action is still ongoing. The main objectives are to further develop a methodology to formally analyse ActionGUI models, to apply it to the ActionGUI models which are being developed for the NESSoS EHealth Use Case, and to write a joint paper on the results.
 
Starting date Participant From To Duration Funded by
2012-09-01 Valdazo Parnisari, Javier IMDEA ETH Zurich 182 days IMDEA
Summary
This mobility action is still ongoing. The main objectives are to further develop an extension of the ActionGUI methodology and tools for modeling business process with security policies (including separation of duties and binding of duties), and to write a joint paper on the results.
 
Starting date Participant From To Duration Funded by
2012-09-01 Clavel, Manuel IMDEA ETH Zurich 182 days FUNDACION Caja Madrid
Summary
This mobility action is still ongoing. The main objectives are to write a joint journal paper on the ActionGUI methodology and tools, and to co-teach a Master-level course on Security Engineering.
 
Starting date Participant From To Duration Funded by
2012-08-22 Lagaisse, Bert KUL INRIA 1 days
Summary
The main goal of this visit was to review the possibilities of collaborative work on authorization technologies in the future. Both KUL and UNITN presented their current research, and a discussion was started about which topics could be explored in the future in a collaborative effort.
 
Starting date Participant From To Duration Funded by
2012-08-22 Decat, Maarten KUL INRIA 1 days
Summary
The main goal of this visit was to review the possibilities of collaborative work on authorization technologies in the future. Both KUL and UNITN presented their current research, and a discussion was started about which topics could be explored in the future in a collaborative effort.
 
Starting date Participant From To Duration Funded by
2012-06-02 Egea, Marina ATOS ETH Zurich 5 days
Summary
During this week, ETH, IMDEA and ATOS worked on a joint journal publication. We also discussed the writing of a book on model-driven security that would contain our results and experiences in this area.
 
Starting date Participant From To Duration Funded by
2012-05-09 Egea, Marina ATOS UNITN 3 days
Summary
During this visit, ATOS presented and validated the NESSoS's Smart Grid scenario in the context of the evaluation of the application of eRISE methodologies to this scenario. It also participated in the students' results assessment.
 
Starting date Participant From To Duration Funded by
2012-05-02 Ben David, olivier-nathanaël INRIA KUL 2 days NeSSOS
Summary
During these two days we worked on the combination of change patterns and runtime adaptation. We studied a problem in relation with access-control. The problem was described with the problem frame notation and we started to implement a solution using Kevoree in order to determine the feasability of the combination of both approaches.
 
Starting date Participant From To Duration Funded by
2012-04-10 Cuellar, Jorge SIEMENS UMA 11 days
Summary
Dr. Cuellar held a short course (10 hours) on Formal Methods for IT-Security. But the main purpose of the visit was to work on location-privacy protection, which will be crucial in FI scenarios. This collaboration has resulted in two joint publications.
 
Starting date Participant From To Duration Funded by
2012-02-06 Clavel, Manuel IMDEA ETH Zurich 5 days NeSSOS
Summary
Work on joint journal article on model-driven security
 
Starting date Participant From To Duration Funded by
2012-02-01 Tran, Le Minh Sang UNITN SINTEF 182 days
Summary
The travel is collaboration between UNITN and SINTEF ICT to develop a method that allows risk analysts to select a cost-effective strategy for identified risks in software systems. The outcome is a generic approach for selecting a cost-effective countermeasure alternative. This approach can apply for defensive risk analysis techniques such as Fault Tree Analysis, CORAS, and other risk models that can be converted to risk graphs. This approach is demonstrated by instantiating it to CORAS with an exemplified scenario taken from the EHealth case study as reported in D11.2. The final result has been reported in D10.3, and submitted to ESSoS 2013.
 
Starting date Participant From To Duration Funded by
2012-01-27 Clavel, Manuel IMDEA LMU 5 days NeSSOS
Summary
Work on ActionUWE (WP2). Seminar on ActionGUI (WP7). Meeting with SIEMENS (WP11)
 
Starting date Participant From To Duration Funded by
2012-01-25 Yskout, Koen KUL INRIA 3 days NeSSOS
Summary
Explore the conceptual and technical integration of change patterns and runtime reconfiguration with Kevoree for security (and access control in particular).
 
Starting date Participant From To Duration Funded by
2012-01-23 Garcia de Dios, Miguel Angel IMDEA LMU 10 days NeSSOS
Summary
The goal of this action was to continue our joint work on defining a model-to-model transformation from UWE models to ActionGUI models. This collaboration has resulted in a joint technical report.
 
Starting date Participant From To Duration Funded by
2011-11-23 Burri, Samuel ETH Zurich IMDEA 3 days NeSSOS
Summary
We identified potential extensions of IMDEA's work on model-driven security by our work on authorzaition-constrained workflows. We started drafting a joint paper on this extension and plan further collaboration.
 
Starting date Participant From To Duration Funded by
2011-11-13 Busch, Marianne LMU IMDEA 12 days NESSOS
Summary
We have worked on the transformation of UWE to ActionGUI in order to transform the result to code.
We have divided the transformation in three steps: step 1 creates a main window for the web application and transforms available menus that are modeled with UWE. Step 2 transforms the remainder of UWE's Presentation Model into ActionGUI. Afterwards, step 3 adds information from the UWE Navigational States Model. Finally, in Step 4 security features are mapped.
 
Starting date Participant From To Duration Funded by
2011-11-11 Deryck, Philippe KUL SIEMENS 1 days IWT
Summary
During this intensive 1-day research meeting on Web Application Security, KUL and SIEMENS have exchanged expertise on cross-domain communication, HTML5 and JavaScript security as part of ongoing collaborations between the two partners in work package 8, and have identified and discussed new strategic research directions in this domain.
 
Starting date Participant From To Duration Funded by
2011-11-11 Desmet, Lieven KUL SIEMENS 1 days IWT
Summary
During this intensive 1-day research meeting on Web Application Security, KUL and SIEMENS have exchanged expertise on cross-domain communication, HTML5 and JavaScript security as part of ongoing collaborations between the two partners in work package 8, and have identified and discussed new strategic research directions in this domain.
 
Starting date Participant From To Duration Funded by
2011-11-11 Van Acker, Steven KUL SIEMENS 1 days IWT
Summary
During this intensive 1-day research meeting on Web Application Security, KUL and SIEMENS have exchanged expertise on cross-domain communication, HTML5 and JavaScript security as part of ongoing collaborations between the two partners in work package 8, and have identified and discussed new strategic research directions in this domain.
 
Starting date Participant From To Duration Funded by
2011-10-10 Schmidt, Holger UDE KUL 3 days NeSSOS
Summary
Joint Research on Security Requirements Engineering, Secure Software Architectures, and Security Patterns
 
Starting date Participant From To Duration Funded by
2011-10-06 Ochoa, Martín SIEMENS IMDEA 2 days NeSSOS
Summary
First steps in defining a sound non-interference analysis for caches by exploiting existing abstract interpretation techniques
 
Starting date Participant From To Duration Funded by
2011-09-28 Gago, Maria UMA CNR 31 days NeSSOS
Summary
During this stay UMA and CNR work together closely in the finalization of D12.1 and other aspects towards the preparation of the first review.
We also discussed ideas for applying for new EU-funded project on the area of trust management and identified this as an area where joint research UMA-CNR will be done
 
Starting date Participant From To Duration Funded by
2011-09-15 Rios, Ruben UMA SIEMENS 90 days MICINN
Summary
During this stay SIEMENS and UMA concentrated on location privacy services, in the field of Wireless Sensor Networks (WSN). The work carried out provides a protocol that refrain an attacker from finding out the location of the base station, which is the most critical node in the network. This collaboration has eventually resulted in two joint publications.
 
Starting date Participant From To Duration Funded by
2011-08-07 Schmidt, Holger UDE KUL 8 days NESSoS
Summary
Joint Research on Security Requirements Engineering, Secure Software Architectures, and Security Patterns
 
Starting date Participant From To Duration Funded by
2011-02-01 Bielova, Nataliia UNITN INRIA 31 days
Summary
During this visit the participant from UNITN learned about static analysis techniques and dynamic mechanisms for secure information flow, that were proposed by the researchers at INRIA Rennes. They then identified the classes of security policies that should be enforced for JavaScript web applications and reasoned about the application of static, dynamic or hybrid techniques to enforce these policies in the web browser settings.
 
Starting date Participant From To Duration Funded by
2011-01-31 Cuellar, Jorge SIEMENS UMA 7 days NESSoS
Summary
Cooperation on location based protocols and on roadmap
 
Starting date Participant From To Duration Funded by
2011-01-17 Basin, David ETH Zurich IMDEA 5 days NESSoS
Summary
Research seminar at IMDEA. Preparation of FOSAD course. New research line on modeling languages for usage control policies.
 
Starting date Participant From To Duration Funded by
2010-10-01 Martin Baena, Jose Antonio UMA CNR 90 days MICINN
Summary
Journal paper submission
 
Copyright © 2011 NESSoS project . All Rights Reserved.
EU Project co-funded by the European Union under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D contract n. 256980