Projects overview

Sort by


Show more information
Description Moreover, the potential of the developed 5G Security enablers will be showcased and demonstrated in the context of carefully selected 5G security use cases (e.g. use cases related to cybersecurity and
Comments Protocols Application level interoperability General interoperability framework Interoperability (ICT) 5G Industrial Reference ICT Architectures ICT performance characteristics Interoperability (ICT) 5G Security
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature Result acronym 5G Security Architecture
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description Now reaching this step requires due diligence to security implications.
Organisation AIRBUS CYBERSECURITY SAS (ACS)
Comments project_id_EC super_admin project_rcn_EC super_admin topic_EC super_admin ICT-08-2019 call_EC super_admin H2020-ICT-2019-2 Cybersecurity ICT performance characteristics Research & Innovation Action
 Review on Cybersecurity Threats Related to Cyber Ranges Result title Review on Cybersecurity Threats Related to Cyber Ranges
 Secure Manufacturing IoT (Aerospace Manufacturing UC) Result description Moreover, this data collection will improve the cyber security of the production chain with the deployment of cyber security technologies (OT SOC, IAM features, etc.).
 Cybersecurity Taxon title Cybersecurity
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments in Platform Lifetime ICT performance characteristics Cybersecurity A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard
 Summary of selected SCOTT security and safety building blocks Result title Summary of selected SCOTT security and safety building blocks
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Cybersecurity Taxon title Cybersecurity
 A Security Architecture for Digital Manufacturing Platforms Taxon description protocols and operating systems being used, the application development and operational process and recommends the use of security measures using security controls.
Show more information
Description However, the vision of future intelligent and autonomous manufacturing units is counterbalanced by exponential increase in security risks and attack surfaces that emerge as the production systems grow
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result title The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result description The COLLABS Level-1 Security Package for Securely Connected Objects: MVP
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result title CF Final Event: Crosscutting, Cybersecurity (Ulrich Seldeslachts) Result acronym CF_Final_Event_Cybersecurity
 Report summarizing main contributions to other WPs - First iteration Result description Report summarizing the updates in the wiki on Business models, Legal aspects, interoperability and standardization, Cybersecurity and Human aspects and main contribution to other WPs - First Iteration
Show more information
Description research centers, companies, and university groups that cover a wide range of topics that can contribute to agile production: advanced robotics as the driving force and digital tools, data privacy and cyber security
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
 Periodic Reporting for period 2 - TRINITY (Digital Technologies, Advanced Robotics and increased Cyber-security for Agile Production in Future European Manufacturing Ecosystems) Result title Periodic Reporting for period 2 - TRINITY (Digital Technologies, Advanced Robotics and increased Cyber-security for Agile Production in Future European Manufacturing Ecosystems) Result description network of digital innovation hubs (DIHs) composed of Research Centers and University Groups specialized in Advanced Robotics and Internet of Things (IoT), supported by a DIH with experts in Robotics Cyber security
Show more information
Description engineering and management, adapted to: existing automation and digitalisation engineering methodologies and tools new IoT and SoS automation and digitalisation engineering and management tools security
 Security Standard Compliance Verification in System of Systems Result title Security Standard Compliance Verification in System of Systems
 Bringing Clouds Down to Earth: Modeling Arrowhead Deployments via Eclipse Vorto Result description ,Sven Erik Jeroschewski (Bosch.IO GmbH), Kevin Olotu (Bosch.IO GmbH), Johannes Kristan (Bosch.IO GmbH)Journal title: Proceedings of the 1st Eclipse Research International Conference on Security, Artificial
Show more information
Description STAR will eliminate security and safety barriers against deploying sophisticated AI systems in production lines.
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 Digital Twins for Security and Safety-Initial version Result title Digital Twins for Security and Safety-Initial version
 Security and Data Governance Infrastructure-Initial version Result description Prototype implementation of the data governance and security policy management infrastructure of task T34 M17 Initial version
Show more information
Comments Information and communication technologies SOA-EDA Secure IT for Manufacturing Intelligence symbiotically solves the SOA-EDA technical tussle, by defining three main topics to be studied and developed (privacy-security-trust
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Cybersecurity ICT performance characteristics Security by design approach.
 D4.2 Design of the Security Framework II Result title D4.2 Design of the Security Framework II
 D4.5 Prototype of the Security Framework II Result description Transport security
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Cybersecurity ICT performance characteristics vf-OS will develop a concept for privacy and security handling, and will ensure that the concept is applicable to and followed by all vf-OS components.
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18) Result description This deliverable represents the core security structure and developed/delivered artefact which will help protect 2nd party factory assets and can be quickly integrated in to applications.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Stackelberg Security Game for Optimizing Security of Federated IoT Platform Instances Result title Stackelberg Security Game for Optimizing Security of Federated IoT Platform Instances
 Security and Privacy Requirements Result description A report summarizing privacy and security requirements
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems  Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Cybersecurity ICT performance characteristics DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Description Security and sovereignity of information are guaranteed by IDSA (Industrial Data Space Association)-based solutions for on-demand and controlled sharing of data among organisations, regulated by smart
 Data Policy Framework. Result description This public deliverable will report the work of Task 25 It will contain the data policy framework of DigiPrime project and will be the reference document for the data management storage traceability and security
Show more information
Description This will result in more job security and direct and indirect job creation in the European manufacturing sector. It will also impact on the employability opportunities.
 Data Security Result title Data Security Result description Cybersecurity & Infrastructure Security Agency and the CIS Critical Security controls. Result acronym Data Security
Show more information
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
Comments super_admin H2020-FOF-2016 Other eco-system aspects Business model aspects Business ecosystems associated to digital platforms Business ecosystems Interoperability (ICT) ICT performance characteristics Cybersecurity
 Key enablers and cross-cutting factors Result description Security is a requirement that may become increasingly important while progressing on the pathway.
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Methodology for SPT for Product Data and Configurations Result description This deliverable details the methodological approach and detailed derived security requirements for the SPT Framework and how it will serve the SAFIRE infrastructure.
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.
Show more information
 Security, Trustworthiness and Data Protection Framework v1 Result title Security, Trustworthiness and Data Protection Framework v1 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
 Security, Trustworthiness and Data Protection Framework v2 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
Show more information
Comments technologies Industrial Reference ICT Architectures ICT performance characteristics Interoperability (ICT) Autonomous Smart Factories Pathway Pathways Interoperability (ICT) ICT performance characteristics Cybersecurity
 QU4LITY SPT Framework (Version 1) Result description Prototype implementation of the SPT framework, which will enable dynamic and flexibly reconfigurable security policies. It will be based on task T3.5;
 Cybersecurity Taxon title Cybersecurity
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 R&I Objective 1.4: Artificial intelligence for productive, excellent, robust and agile manufacturing chains - Predictive manufacturing capabilities & logistics of the future Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
Show more information
Description engineering methodology, covering the complete engineering lifecycle and handling efficiently the salient characteristics of MRS such as openness, uncertainty, variability, and interplay of safety and security
 Safety-Security Co-Engineering Framework Result title Safety-Security Co-Engineering Framework Result description This report will describe the co engineering process of design artefacts ExSce with safety and security analysis artefacts EDDIs
Show more information
Comments Composability ICT performance characteristics Application level interoperability General interoperability framework Interoperability (ICT) Real-time communication capability ICT performance characteristics Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Autonomous Smart Factories Pathway Pathways Autonomy in factories is achieved by security systems that produce alerts and warnings, by training courses that does not require a trainer and by
 Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms Result title Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms Result description engines listed on this page.Authors: Enrico Ferrera, Rosaria Rossini, Davide Conzon, Sandro Tassone, Claudio PastroneJournal title: 2016 8th IFIP International Conference on New Technologies, Mobility and Security
Show more information
Comments ICT performance characteristics Strong attention will be given to augmenting the auto-binding and auto-configuration functionalities of the IEC-61499 technology with specific security-related mechanisms
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments interoperability General interoperability framework Interoperability (ICT) 5G, WirelessHart Operating systems Technologies and enablers Information and communication technologies ROS (http://www.ros.org/ ) Cybersecurity
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems