SlideShare a Scribd company logo
1 of 5
Download to read offline
EFFECTS+
Systems and Networks Cluster Workshop

                       Roland Rieke

    Fraunhofer Institute for Secure Information Technology SIT


                    July 4th-5th, 2011
Purpose of the S & N Cluster Workshop on Models




• Identify possible areas of collaboration among projects
• Identify which concrete models are publicly available and
  re-usable in related projects
• Identify gaps between existing approaches and promising areas
  for future research
Presentations at the Models Workshop
• Roland Rieke (MASSIF): Objectives of the EFFECTS+ Systems & Networks
  Cluster Workshop on Models
• Igor Kotenko (MASSIF): Analytical attack modeling and security evaluation in
  MASSIF
• Teodor Sommestad (VIKING): Enterprise Architecture Models for Security
  Analysis
• Mats B-O Larsson (VIKING): Virtual City Simulator (ViCiSi)
• Domenico Presenza (ASSERT4SOA): Ontologies in ASSERT4SOA
• Federica Paci (NESSoS, SecureChange): Managing Security and Changes
  throughout the whole System Engineering Process
• Antonio Lioy (PoSecCo): PoSecCo models
• Steffen Peter (WSAN4CIP, TAMPRES): Assessment models to Improve the
  Usability of Security in Wireless Sensor Networks
• James Davey (VIS-SENSE): Multi-Dimensional Clustering for the Purposes of
  Root-Cause Analysis
• Mark McLaughlin (ENDORSE): Introducing the ENDORSE Privacy Rules
  Definition Language
• Roberto Baldoni (CoMiFin): Collaborative Security for Protection of Financial
  Critical Infrastructures: The Semantic Room abstraction model
Results (1)



EFFECTS+ supported Systems & Networks cluster activities
  • Classification (overview) of areas covered by the presented
    models (interactively edit a table on EFFECTS+ web-site)
  • Joint paper (e.g. FIA book), or workshop: European perspective
    (survey) of models on security, privacy, trust
  • Followup S&N cluster meeting on specific aspects of multilateral
    project cooperations (Feb. 2012, HP-labs, Bristol)
  • Cyber-Security and Privacy EU Forum CSPEF 2012
    (Berlin 24.-25.4.) Exploitation/Tutorials
Results (2): Planned multilateral cooperations
Lead: Collaborating projects              Area of common interest
R. Rieke, G. Bjoerkman:         MASSIF,   SCADA, critical infrastructures,
VIKING (already started)                  cyber security modelling
A. Lioy: PoSecCo, ENDORSE                 Privacy
A. Lioy:    PoSecCo, ASSERT4SOA,          Service modelling
MASSIF
I. Kotenko: MASSIF, ANIKETOS,             Analytical attack modeling and
PoSecCo, Hydra, WSAN4CIP, AS-             security evaluation (SNDS2012)
SERT4SOA
R. Baldoni: Comifin, MASSIF, VIS-          Systems Arch., CEP, modelling
SENSE,     SYS-SEC,   ANIKETOS,           platforms, monitoring large sys-
WSAN4CIP                                  tems, pattern detection, privacy
                                          preserving
N. Papanikolaou: ANIKETOS, EN-            Policy, (a) theoretical aspects (b)
DORSE,    POSECCO,   MASSIF(?),           applications
COMIFIN
M. Larsson: VIKING, . . . (?)             use ViCiSi in other projects

More Related Content

What's hot

TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
zdooly
 

What's hot (19)

IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)IT Summit 2015 (IoT panel)
IT Summit 2015 (IoT panel)
 
OUGF - OSAmI - OSGi Ubiquity
OUGF - OSAmI - OSGi UbiquityOUGF - OSAmI - OSGi Ubiquity
OUGF - OSAmI - OSGi Ubiquity
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Atmosphere: project objctives
Atmosphere: project objctivesAtmosphere: project objctives
Atmosphere: project objctives
 
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
EOSC-hub Week - Cloud Lightning Talks: AtmosphereEOSC-hub Week - Cloud Lightning Talks: Atmosphere
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Networking Research Projects Help
Networking Research Projects Help Networking Research Projects Help
Networking Research Projects Help
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Inventory of Emerging Technology Uploads
Inventory of Emerging Technology UploadsInventory of Emerging Technology Uploads
Inventory of Emerging Technology Uploads
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
42
4242
42
 
Ijwns
IjwnsIjwns
Ijwns
 

Similar to Effect splus systems-and-network-cluster-results-draft-v1

Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
fcleary
 
GoOpen 2010: Reidar Conradi
GoOpen 2010: Reidar ConradiGoOpen 2010: Reidar Conradi
GoOpen 2010: Reidar Conradi
Friprogsenteret
 

Similar to Effect splus systems-and-network-cluster-results-draft-v1 (20)

Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Nessos
NessosNessos
Nessos
 
GoOpen 2010: Reidar Conradi
GoOpen 2010: Reidar ConradiGoOpen 2010: Reidar Conradi
GoOpen 2010: Reidar Conradi
 
European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunities
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Syssec
SyssecSyssec
Syssec
 
CV | Michele Spagnuolo
CV | Michele SpagnuoloCV | Michele Spagnuolo
CV | Michele Spagnuolo
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708Summer school bz_fp7research_20100708
Summer school bz_fp7research_20100708
 
5 Thomas Magedanz
5  Thomas Magedanz5  Thomas Magedanz
5 Thomas Magedanz
 
Expert mining compsac-2014
Expert mining compsac-2014Expert mining compsac-2014
Expert mining compsac-2014
 
This is Next-Gen
This is Next-GenThis is Next-Gen
This is Next-Gen
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
EOSC in practice - Silvana Muscella (chair EOSC HLEG)
EOSC in practice - Silvana Muscella (chair EOSC HLEG)EOSC in practice - Silvana Muscella (chair EOSC HLEG)
EOSC in practice - Silvana Muscella (chair EOSC HLEG)
 
Duc le CV
Duc le CVDuc le CV
Duc le CV
 
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...
 
SC7 Workshop 3: Workshop Presentation
SC7 Workshop 3: Workshop PresentationSC7 Workshop 3: Workshop Presentation
SC7 Workshop 3: Workshop Presentation
 
DSpace-CRIS_An open source solution for Research_EDU15
DSpace-CRIS_An open source solution for Research_EDU15DSpace-CRIS_An open source solution for Research_EDU15
DSpace-CRIS_An open source solution for Research_EDU15
 
Presentation 2019 08-30
Presentation 2019 08-30Presentation 2019 08-30
Presentation 2019 08-30
 
Thirteen Years of SysML: A Systematic Mapping Study
Thirteen Years of SysML: A Systematic Mapping StudyThirteen Years of SysML: A Systematic Mapping Study
Thirteen Years of SysML: A Systematic Mapping Study
 

More from fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
fcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
fcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
fcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
fcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
fcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
fcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
fcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
fcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
fcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
fcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
fcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
fcleary
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
fcleary
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
fcleary
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
fcleary
 

More from fcleary (20)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Tdl
TdlTdl
Tdl
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Effect splus systems-and-network-cluster-results-draft-v1

  • 1. EFFECTS+ Systems and Networks Cluster Workshop Roland Rieke Fraunhofer Institute for Secure Information Technology SIT July 4th-5th, 2011
  • 2. Purpose of the S & N Cluster Workshop on Models • Identify possible areas of collaboration among projects • Identify which concrete models are publicly available and re-usable in related projects • Identify gaps between existing approaches and promising areas for future research
  • 3. Presentations at the Models Workshop • Roland Rieke (MASSIF): Objectives of the EFFECTS+ Systems & Networks Cluster Workshop on Models • Igor Kotenko (MASSIF): Analytical attack modeling and security evaluation in MASSIF • Teodor Sommestad (VIKING): Enterprise Architecture Models for Security Analysis • Mats B-O Larsson (VIKING): Virtual City Simulator (ViCiSi) • Domenico Presenza (ASSERT4SOA): Ontologies in ASSERT4SOA • Federica Paci (NESSoS, SecureChange): Managing Security and Changes throughout the whole System Engineering Process • Antonio Lioy (PoSecCo): PoSecCo models • Steffen Peter (WSAN4CIP, TAMPRES): Assessment models to Improve the Usability of Security in Wireless Sensor Networks • James Davey (VIS-SENSE): Multi-Dimensional Clustering for the Purposes of Root-Cause Analysis • Mark McLaughlin (ENDORSE): Introducing the ENDORSE Privacy Rules Definition Language • Roberto Baldoni (CoMiFin): Collaborative Security for Protection of Financial Critical Infrastructures: The Semantic Room abstraction model
  • 4. Results (1) EFFECTS+ supported Systems & Networks cluster activities • Classification (overview) of areas covered by the presented models (interactively edit a table on EFFECTS+ web-site) • Joint paper (e.g. FIA book), or workshop: European perspective (survey) of models on security, privacy, trust • Followup S&N cluster meeting on specific aspects of multilateral project cooperations (Feb. 2012, HP-labs, Bristol) • Cyber-Security and Privacy EU Forum CSPEF 2012 (Berlin 24.-25.4.) Exploitation/Tutorials
  • 5. Results (2): Planned multilateral cooperations Lead: Collaborating projects Area of common interest R. Rieke, G. Bjoerkman: MASSIF, SCADA, critical infrastructures, VIKING (already started) cyber security modelling A. Lioy: PoSecCo, ENDORSE Privacy A. Lioy: PoSecCo, ASSERT4SOA, Service modelling MASSIF I. Kotenko: MASSIF, ANIKETOS, Analytical attack modeling and PoSecCo, Hydra, WSAN4CIP, AS- security evaluation (SNDS2012) SERT4SOA R. Baldoni: Comifin, MASSIF, VIS- Systems Arch., CEP, modelling SENSE, SYS-SEC, ANIKETOS, platforms, monitoring large sys- WSAN4CIP tems, pattern detection, privacy preserving N. Papanikolaou: ANIKETOS, EN- Policy, (a) theoretical aspects (b) DORSE, POSECCO, MASSIF(?), applications COMIFIN M. Larsson: VIKING, . . . (?) use ViCiSi in other projects