1 Ginés Dólera Tormo Phone: Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D Heidelberg, Germany PROFESSIONAL INTERESTS Information privacy and security Identity management, access control, user- centric and privacy- enhanced technologies, trust and reputation, private data relationships, cloud environments, cryptography. WORK EXPERIENCE Nov 2013 Present Development Engineer at fluid Operations, Germany (http://www.fluidops.com) Development of end- to- end monitoring and management of data center resources (enterprise storage, hypervisors, physical blades, network, enterprise applications). Development of one- click provisioning of infrastructure resources and enterprise application landscapes, including metering. Development of extensible provider architecture, based on semantic wiki, to allow for on- demand integration of additional data sources. Sep Oct Research Scientist within the Security Group at NEC Laboratories Europe, Germany (http://www.neclab.eu) Identity management and access control o Enhancement of identity management solutions with virtualization capabilities to support Identity as a Service. o Integration of identity management solutions within Cloud Marketplace solutions to enhance SSO features. Secure and private Cloud storage o Design of secure storage with capabilities of relating private information in a privacy- preserving way. o Research on techniques to allow advanced search over encrypted data, and develop a framework prototype. Design and development of Healthcare infrastructures to enable efficient handling of emergencies. Research and development of reputation- based solution within different contexts, such as Internet of Things, Hybrid Broadband Broadband TV or e- Health. Active collaboration in European FP7 research projects o HBB- Next (http://www.hbb- next.eu) o IoT- A (http://www.iot- a.eu)
2 June 2011 Sep Nov Sep July 2009 Oct July 2008 June 2009 PhD Student internship within the Security Group at NEC Laboratories Europe, Germany (http://www.neclab.eu) Enhancement of the capabilities of the OpenID protocol, by building a reputation management framework prototype on top of it. R&D&i Researcher / Java developer within the Department of Information and Communications Engineering at the, Spain (http://www.diic.um.es/) Education and Research activities Research and development of infrastructures to provide e- services with the required underlying secure authentication and management approach. Development of scenarios related to Identity Management and Secure Data Transfer. Active collaboration in European FP7 research projects o SEMIRAMIS (Secure Management of Information across multiple Stakeholders, cip.eu) R&D Researcher / Developer at Cátedra SAES, Spain (http://www.catedrasaes.org) Underwater acoustic, electronics and Research activities Design and development of a transmission control protocol and communication assurance for military communications together with Indra Company (http://www.indracompany.com). Research on privacy and user- centricity within Identity Management systems. Research on authentication and access control systems. R&D&i Researcher / Java developer within the Department of Information and Communications Engineering at the, Spain (http://www.diic.um.es/) Research and development of Identity Management systems, providing authentication and authorization based on standards (SAML, XACML, XKMS). Management of Public Key certificates and PKI solutions. Integration with electronic ID cards. EDUCATION AND TRAINING Oct present Sep June 2010 PhD degree, Computer Science Thesis title: Enhancing User- Centric Identity Management Systems with Reputation Models in Distributed Environments. Master s degree in Advanced Information and Telematic Technologies, Computer Science Master Thesis: Identity management infrastructure for advanced environments.
3 Sep Sep Degree on Computer Science (5 years degree) (Graduated With Honors) Spec: Telematic technologies. PUBLICATIONS AND OTHER RESEARCH ACTIVITIES Journals Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "Towards privacy- preserving reputation management for hybrid broadcast broadband applications", Computers & Security, (accepted) [IF=1.172, Q2 (2013)] Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "Managing XACML systems in distributed environments through Meta- Policies", Computers & Security, 2014 (accepted) [IF=1.172, Q2 (2013)] Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "Dynamic counter- measures for risk- based access control systems: an evolutive approach", Elsevier Future Generation Computer Systems, Special Issue on Trust, Security and Privacy in Distributed Systems, 2014 (accepted) [IF=2.639, Q1 (2013)] Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "Dynamic and flexible selection of a reputation mechanism for heterogeneous environments", Elsevier Future Generation Computer Systems, Special Issue on Trustworthy Data Fusion and Mining in Internet of Things, 2014 [IF=2.639, Q1 (2013)] Daniel O. Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, José M. Alcaraz Calero, Gregorio Martínez Pérez, "Live digital, remember digital: State of the art and research challenges", Computers & Electrical Engineering, 40th- year Commemorative Special Issue, vol. 40, no. 1, pp , 2014 [IF=0.992, Q3 (2013)] Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "Towards the integration of reputation management in OpenID", Computer Standards & Interfaces, Special Issue on Secure Mobility in Future Communication Systems under Standardization, vol. 36, no. 3, pp , March 2014 [IF=1.177, Q2 (2013)] Ginés Dólera Tormo, Félix Gómez Mármol, Joao Girao, Gregorio Martínez Pérez, "Identity management: In privacy we trust. Bridging the trust gap in e- Health environments", IEEE Security & Privacy, Special Issue on Health IT Security and Privacy, vol. 11, no. 6, pp , 2013 [IF=0.721, Q3 (2013)] Ginés Dólera Tormo, Gabriel López Millán, Gregorio Martínez Pérez, "Definition of an advanced identity management infrastructure", International Journal of Information Security, vol. 12, no. 3, pp , June 2013 [IF=0.941, Q2 (2013)] Conferences Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "ROMEO: ReputatiOn Model Enhancing OpenID Simulator", 19th European Symposium on Research in Computer Security (ESORICS), Security & Trust Management Workshop (STM 2014), Wroclaw, Poland, 7-11/09/2014. LNCS 8743, pp Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez, "On the Application of Trust and Reputation Management and User- centric Techniques for Identity Management Systems", XII Spanish Meeting on Cryptology and Information Security (RECSI 2012), San Sebastián, Spain, 04-07/09/2012.
5 SOCIAL SKILLS AND COMPETENCES Experience in supervision of students internships. Team spirit and willingness to share knowledge with others. Sense of organization, initiative, responsibility and aptitude to learn. Quick understanding of technical problems, strong analytical and architectural skills and ability to quickly acquire knowledge in new areas. Capabilities to rapidly build functional prototypes. Scrum Master
Professor Elizabeth Chang BSc, MSc, PhD, MIEEE, MACM, MACS Professor Elizabeth Chang Professor of IT School of IS, Curtin Business School Director Institute for Digital Ecosystems and Business Intelligence
Connecting Health and Care for the Nation A Shared Nationwide Interoperability Roadmap DRAFT Version 1.0 Table of Contents Letter from the National Coordinator... 4 Questions on the Roadmap... 6 Executive
Summary of Responses to an Industry RFI Regarding a Role for CMS with Personal Health Records Table of Contents EXECUTIVE SUMMARY... 4 1. INTRODUCTON... 7 2. CMS ROLE WITH PHRs... 9 What PHR functionalities
Siebel Security Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
Oracle Access Management Complete, Integrated, Scalable Access Management Solution O R A C L E W H I T E P A P E R M A Y 2 0 1 5 Disclaimer The following is intended to outline our general product direction.
ascent Thought leadership from Atos white paper Data Analytics as a Service: unleashing the power of Cloud and Big Data Your business technologists. Powering progress Big Data and Cloud, two of the trends
FEDERAL HEALTH IT STRATEGIC PLAN 2015 2020 Prepared by: The Office of the National Coordinator for Health Information Technology (ONC) Office of the Secretary, United States Department of Health and Human
ON DEVELOPING SPATIAL DATA INFRASTRUCTURE OF CHINA Deren Li, Huayi Wu LIESMARS, Wuhan University Luoyu Road 129, Wuhan, P.R. China, 430079 Email: email@example.com, firstname.lastname@example.org Commission
EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher
D6.3.1 SPECIFIC ENABLERS - INITIAL RELEASE September 2013 ABSTRACT This document describes the initial release of Specific Enablers for the Future Internet Content project. This performs the initial launch
Curriculum Vitæ Claudia Canali Personal Information Name: Claudia Canali Date of birth: June 16, 1977 Place of birth: Carpi (Modena), Italy Citizenship: Italian Email address: email@example.com
MAP-I Joint doctoral programme in Computer Science of Universidade do Minho, Universidade de Aveiro and Universidade do Porto 2010/11 Course Edition System Software and Applications for Ambient Intelligence
Special Publication 800-95 (Draft) Guide to Secure Web Services Recommendations of the National Institute of Standards and Technology Anoop Singhal Theodore Winograd Karen Scarfone NIST Special Publication
FOREWORD A key component in protecting a nation s critical infrastructure and key resources (CIKR) is the security of control systems. WHAT ARE CONTROL SYSTEMS? Supervisory Control and Data Acquisition
EUCIP IT Systems Architect Professional Profile Specification Version 3.0, April 2011 Short Description A EUCIP IT Systems Architect is expected to play a key role in designing performing and secure IT
Public Access Plan U.S. Department of Energy July 24, 2014 ENERGY.GOV Table of Contents Background... 3 Authority... 3 Public Access to Scientific Publications... 4 Scope... 4 Requirements... 5 Applicability...
1 of 12 One Hundred Second Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Thursday, the third day of January, one thousand nine hundred and ninety-one
National Spatial Data Infrastructure Strategic Plan 2014 2016 Federal Geographic Data Committee December 2013 Federal Geographic Data Committee Federal Geographic Data Committee, Reston, Virginia: 2013
Chang Liu, D.B.A. Professor & Department Chair Operations Management & Information Systems (OM&IS) NIU College of Business Telephone: (815) 753-3021 Email: firstname.lastname@example.org Educational Background Mississippi
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Job Family Standard for Administrative Work in the Information Technology Group, 2200 TABLE OF CONTENTS INTRODUCTION... 2 COVERAGE... 2 MODIFICATIONS TO AND CANCELLATIONS OF OTHER EXISTING OCCUPATIONAL
26th Edition An ESRI Technical Reference Document August 2009 Prepared by: Dave Peters Systems Integration Environmental Systems Research Institute, Inc. 380 New York Street Redlands, California 92373-8100
Front cover Introduction to Grid Computing Learn grid computing basics Understand architectural considerations Create and demonstrate a grid environment Bart Jacob Michael Brown Kentaro Fukui Nihar Trivedi
Università degli Studi Guglielmo Marconi Courses and Programs in English POLITICAL SCIENCE APPLIED SCIENCES AND TECHNOLOGIES ART EDUCATION SCIENCE BUSINESS BACHELOR S DEGREE PROGRAMS IN ENGLISH 3 BA of
Office of the National Coordinator for Health Information Technology (ONC) Federal Health Information Technology Strategic Plan 2011 2015 Table of Contents Introduction 3 Federal Health IT Vision and Mission