Projects overview

Sort by

Showing 1 to 30 of 78 entries


Show more information
Title 5G Enablers for Network and System Security and Resilience
Description Moreover, the potential of the developed 5G Security enablers will be showcased and demonstrated in the context of carefully selected 5G security use cases (e.g. use cases related to cybersecurity and
Comments APIs and Communication Protocols Application level interoperability Data communication and interoperability 5G ICT Architectures Technologies and enablers Information and communication technologies 5G Security
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature Result acronym 5G Security Architecture
 5G Security and Privacy Enablers Result comments Manufacturing Applications areas and sectors The heterogeneous nature of the new networks, devices and services will raise a lot of security concerns, such as trust and privacy, that have to be addressed
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments priorities Domain 6: Customer-focused manufacturing project_id_EC admin project_rcn_EC admin topic_EC admin FoF-05-2014 call_EC admin H2020-FoF-2014 deliverableType_EC admin result_rcn_EC admin Cybersecurity
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design Result comments result_rcn_EC admin deliverableType_EC admin Other Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Collaborative Product-Service Factories Digitalisation pathways
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Cybersecurity ICT performance characteristics Security by design approach.
 Design of the Security Framework I Result title Design of the Security Framework I
 Design of the Security Framework II Result title Design of the Security Framework I Result comments Cybersecurity ICT performance characteristics
 Prototype of the Security Framework II Result description •Transport security Result comments Cybersecurity ICT performance characteristics
 Connectors for Inter-factory Interoperability and Logistics II Result comments Cybersecurity ICT performance characteristics
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Design and Implementation of Security and Privacy for Core Business Services Result title Design and Implementation of Security and Privacy for Core Business Services Result description A design and implementation report on privacy and security services Result comments result_rcn_EC admin deliverableType_EC admin Documents, reports Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Common digital platform used for tenders and bidding
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems  Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
Show more information
Comments Cybersecurity ICT performance characteristics vf-OS will develop a concept for privacy and security handling, and will ensure that the concept is applicable to and followed by all vf-OS components.
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18) Result description This deliverable represents the core security structure and developed/delivered artefact which will help protect 2nd party factory assets and can be quickly integrated in to applications. Result comments result_rcn_EC admin deliverableType_EC admin Other Cybersecurity ICT performance characteristics
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Cybersecurity ICT performance characteristics DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level
 Periodic Reporting for period 1 - DIGICOR (Decentralised Agile Coordination Across Supply Chains) Result description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description Now reaching this step requires due diligence to security implications.
Organisation AIRBUS CYBERSECURITY SAS (ACS)
Comments project_id_EC admin project_rcn_EC admin topic_EC admin ICT-08-2019 call_EC admin H2020-ICT-2019-2 Cybersecurity ICT performance characteristics Research & Innovation Action (RIA) Project type - instrument
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
Comments deployment Other eco-system aspects Business model aspects Business ecosystem Business model aspects of digital platform deployment Data communication and interoperability ICT performance characteristics Cybersecurity
 Key enablers and cross-cutting factors Result description Security is a requirement that may become increasingly important while progressing on the pathway.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Methodology for SPT for Product Data and Configurations Result description This deliverable details the methodological approach and detailed derived security requirements for the SPT Framework and how it will serve the SAFIRE infrastructure.
 SAFIRE Electrolux pilot: Cloud-driven product optimization Result comments , analytics, processing and AI Information and communication technologies Data collection, storage, analytics, processing and AI Technologies and enablers Information and communication technologies Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.

SCOTT | Secure COnnected Trustable Things

01-05-2017

-

31-10-2020

Calltopic: ECSEL-2016-2

Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments in Platform Lifetime ICT performance characteristics Cybersecurity A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard
 Cybersecurity Taxon title Cybersecurity
 A Security Architecture for Digital Manufacturing Platforms Taxon description protocols and operating systems being used, the application development and operational process and recommends the use of security measures using security controls.
Show more information
Comments aspects Business model aspects of digital platform deployment Data communication and interoperability ICT performance characteristics Real-time communication capability ICT performance characteristics Cybersecurity
 Lombardy Champion - Zero-Hours Quality Result comments Testing Stations Connectivity & network interoperability – communication protocols ICT performance characteristics Integration level interoperability Data communication and interoperability OPC UA, NGSI Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Cybersecurity ICT performance characteristics Resilience ICT performance characteristics Scalability ICT performance characteristics Services ICT performance characteristics Manufacturing Cells Manufacturing
 Periodic Reporting for period 1 - FAR-EDGE (Factory Automation Edge Computing Operating System Reference Implementation) Result description O4: Implement and integrate multi-layer and compositional security-by-design techniques within the FAREDGE approach.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments (IA) Project type - instrument Autonomous Smart Factories Digitalisation pathways Hyperconnected Factories Digitalisation pathways Collaborative Product-Service Factories Digitalisation pathways Cybersecurity
 D2.11 Reference Architecture and Blueprints (Version 1) Result comments Digitalisation pathways Data communication and interoperability ICT performance characteristics Cybersecurity ICT performance characteristics Real-time communication capability ICT performance characteristics
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 R&I Objective 1.4: Artificial intelligence for productive, excellent, robust and agile manufacturing chains - Predictive manufacturing capabilities & logistics of the future Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
Show more information
Comments Application level interoperability Data communication and interoperability 5G, WirelessHart Operating systems Technologies and enablers Information and communication technologies ROS (http://www.ros.org/ ) Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments ICT performance characteristics Strong attention will be given to augmenting the auto-binding and auto-configuration functionalities of the IEC-61499 technology with specific security-related mechanisms
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Cybersecurity ICT performance characteristics Data Analytics and Complex Event Processing will deal with semantic interoperability and security at lower data acquisition layers Scalability ICT performance
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments security.
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description protocols and operating systems being used, the application development and operational process and recommends the use of security measures using security controls. Comments security.
Show more information
Comments characteristics Application level interoperability Data communication and interoperability Integration level interoperability ICT performance characteristics Data communication and interoperability Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
 Efficiency Optimization of a Water Turbine via CFD Simulation on the Cloud Result description By increasing the accuracy of the CFD, Stellba can reduce the security margin for their efficiency guarantees, which increases the competitiveness in the market.
 Number of participating SMEs Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
Show more information
Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
 AAA - Access, Authorisation and Authentication Taxon description   https://en.wikipedia.org/wiki/AAA_(computer_security) ;
 Process reliability - dependability Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
Show more information
Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
 Cloud computing Taxon description   Considerations need to be made to security measures in the cloud (kubernetes, container security), identity & access, or carefully considering the security measures by the respective
 AAA - Access, Authorisation and Authentication Comments These are based on the JWT technology and are implemented by using the Spring Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.

AMable | AdditiveManufacturABLE

01-09-2017

-

31-08-2021

Calltopic: FoF.2017.12

Show more information
 D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who. Result title D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who. Result description D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who.