Projects overview

Sort by

Showing 1 to 30 of 74 entries


Show more information
Title 5G Enablers for Network and System Security and Resilience
Description Moreover, the potential of the developed 5G Security enablers will be showcased and demonstrated in the context of carefully selected 5G security use cases (e.g. use cases related to cybersecurity and
Comments services Skills - Knowledge-workers Technologies and enablers 5G can deliver support to workers Standards Standards and standardisation 5G critically depends on standards to ensure interoperability, security
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature Result acronym 5G Security Architecture
 5G Security and Privacy Enablers Result comments Manufacturing Applications areas and sectors The heterogeneous nature of the new networks, devices and services will raise a lot of security concerns, such as trust and privacy, that have to be addressed
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments in Platform Lifetime ICT performance characteristics Cybersecurity A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard
 Summary of selected SCOTT security and safety building blocks Result title Summary of selected SCOTT security and safety building blocks
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
Show more information
Comments priorities Domain 6: Customer-focused manufacturing project_id_EC admin project_rcn_EC admin topic_EC admin FoF-05-2014 call_EC admin H2020-FoF-2014 deliverableType_EC admin result_rcn_EC admin Cybersecurity
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design Result comments result_rcn_EC admin deliverableType_EC admin Other Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Collaborative Product-Service Factories Pathway Digitalisation
Show more information
Comments Cybersecurity ICT performance characteristics Security by design approach.
 Design of the Security Framework I Result title Design of the Security Framework I
 Design of the Security Framework II Result title Design of the Security Framework I Result comments Cybersecurity ICT performance characteristics COMPOSITION
 Prototype of the Security Framework II Result description •Transport security Result comments Cybersecurity ICT performance characteristics COMPOSITION
Show more information
Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Design and Implementation of Security and Privacy for Core Business Services Result title Design and Implementation of Security and Privacy for Core Business Services Result description A design and implementation report on privacy and security services Result comments result_rcn_EC admin deliverableType_EC admin Documents, reports Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Common digital platform used for tenders and bidding
 Cybersecurity Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
Show more information
Comments Cybersecurity ICT performance characteristics vf-OS will develop a concept for privacy and security handling, and will ensure that the concept is applicable to and followed by all vf-OS components.
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18) Result description This deliverable represents the core security structure and developed/delivered artefact which will help protect 2nd party factory assets and can be quickly integrated in to applications. Result comments result_rcn_EC admin deliverableType_EC admin Other Cybersecurity ICT performance characteristics vf-OS
Show more information
Title Digital Technologies, Advanced Robotics and increased Cyber-security for Agile Production in Future European Manufacturing Ecosystems
Description research centers, companies, and university groups that cover a wide range of topics that can contribute to agile production: advanced robotics as the driving force and digital tools, data privacy and cyber security
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Cybersecurity ICT performance characteristics DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level
 Periodic Reporting for period 1 - DIGICOR (Decentralised Agile Coordination Across Supply Chains) Result description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
Comments call_EC admin H2020-FOF-2016 Other eco-system aspects Business model aspects Business ecosystems associated to digital platforms Business ecosystems Interoperability (ICT) ICT performance characteristics Cybersecurity
 Key enablers and cross-cutting factors Result description Security is a requirement that may become increasingly important while progressing on the pathway.
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Methodology for SPT for Product Data and Configurations Result description This deliverable details the methodological approach and detailed derived security requirements for the SPT Framework and how it will serve the SAFIRE infrastructure.
 SAFIRE Electrolux pilot: Cloud-driven product optimization Result comments , analytics, processing and AI Information and communication technologies Data collection, storage, analytics, processing and AI Technologies and enablers Information and communication technologies Cybersecurity
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.
Show more information
Comments Reference ICT Architectures ICT performance characteristics Interoperability (ICT) Autonomous Smart Factories Pathway Digitalisation pathways Interoperability (ICT) ICT performance characteristics Cybersecurity
 QU4LITY SPT Framework (Version 1) Result description Prototype implementation of the SPT framework, which will enable dynamic and flexibly reconfigurable security policies. It will be based on task T3.5;
 D2.11 Reference Architecture and Blueprints (Version 1) Result comments Reference ICT Architectures ICT performance characteristics Interoperability (ICT) Autonomous Smart Factories Pathway Digitalisation pathways Interoperability (ICT) ICT performance characteristics Cybersecurity
Show more information
Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
 Efficiency Optimization of a Water Turbine via CFD Simulation on the Cloud Result description By increasing the accuracy of the CFD, Stellba can reduce the security margin for their efficiency guarantees, which increases the competitiveness in the market.
 Number of participating SMEs Comments . - Augmenting the product portfolio to solve more complex problems in a shorter time, increasing the accuracy of the computations and reducing the security margin assure and raise the competitiveness.
Show more information
Comments Simulation Addressed processes Software ownership Business model aspects Interoperability (ICT) ICT performance characteristics Real-time communication capability ICT performance characteristics Cybersecurity
 Lombardy Champion - Zero-Hours Quality Result comments Connectivity & network interoperability – communication protocols ICT performance characteristics Integration level interoperability General interoperability framework Interoperability (ICT) OPC UA, NGSI Cybersecurity
Show more information
Comments Cybersecurity ICT performance characteristics Resilience ICT performance characteristics Scalability ICT performance characteristics Work station Manufacturing system levels Manufacturing system levels
 Periodic Reporting for period 1 - FAR-EDGE (Factory Automation Edge Computing Operating System Reference Implementation) Result description O4: Implement and integrate multi-layer and compositional security-by-design techniques within the FAREDGE approach.
Show more information
 Security, Trustworthiness and Data Protection Framework v1 Result title Security, Trustworthiness and Data Protection Framework v1 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
 Security, Trustworthiness and Data Protection Framework v2 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.

AMable | AdditiveManufacturABLE

01-09-2017

-

31-08-2021

Calltopic: FoF.2017.12

Show more information
 D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who. Result title D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who. Result description D101.1 Authentication for Data Encryption and Security in SME Environments. A guide to the benefits and requirements of using certificates, passwords and other measures to identify who is who.
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
 R&I Objective 1.4: Artificial intelligence for productive, excellent, robust and agile manufacturing chains - Predictive manufacturing capabilities & logistics of the future Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy