Projects overview

Sort by


Show more information
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 Periodic Reporting for period 1 - COLLABS (A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems) Result title Periodic Reporting for period 1 - COLLABS (A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems)
 The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result description The COLLABS Level-1 Security Package for Securely Connected Objects: MVP
Show more information
Comments Information and communication technologies SOA-EDA Secure IT for Manufacturing Intelligence symbiotically solves the SOA-EDA technical tussle, by defining three main topics to be studied and developed (privacy-security-trust
 Privacy, Security and Data Protection in product-service design Final Result title Privacy, Security and Data Protection in product-service design Final Result description Privacy, Security and Data Protection in product-service design
 Privacy, Security and Data Protection in product-service design First Result description Privacy, Security and Data Protection in product-service design
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Methodology for SPT for Product Data and Configurations Result description This deliverable details the methodological approach and detailed derived security requirements for the SPT Framework and how it will serve the SAFIRE infrastructure.
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.
Show more information
 A Cyber-Physical Approach to Resilience and Robustness by Design Result title A Cyber-Physical Approach to Resilience and Robustness by Design
 Security, Trustworthiness and Data Protection Framework v1 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
 Security, Trustworthiness and Data Protection Framework v2 Result description Prototype implementation of PROPHESY-CPS security and data protection mechanisms.
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard(s) addressed and impact on implementation ICT performance characteristics
 Knowledge Representation of Cyber-physical Systems for Monitoring Purpose Result title Knowledge Representation of Cyber-physical Systems for Monitoring Purpose
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description protocols and operating systems being used, the application development and operational process and recommends the use of security measures using security controls.

iDev40 | Integrated Development 4.0

01-05-2018

-

30-04-2021

Show more information
Organisation GIESECKE+DEVRIENT MOBILE SECURITY GMBH (GD)
 AIT Cyber Range - Flexible Cyber Security Environment for Exercises, Training and Research Result title AIT Cyber Range - Flexible Cyber Security Environment for Exercises, Training and Research
 The Sound of Silence - Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects Result description search via the search engines listed on this page.Authors: Ralf Ramsauer, Lukas Bulwahn, Daniel Lohmann, Wolfgang MauererJournal title: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security
Show more information
Comments These identified Standards refers mainly to ICT-related topics such as cyber security, data communication/exchange protocols, data mining and control SW.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Standards Comments These identified Standards refers mainly to ICT-related topics such as cyber security, data communication/exchange protocols, data mining and control SW.
Show more information
Description There exist a number of cyber-physical systems, cloud services and many components of different nature in the plethora of use cases that have validated the MANTIS Maintenance architecture.
 Security Threats and Issues in Automation IoT Result title Security Threats and Issues in Automation IoT
 Optimising maintenance: What are the expectations for Cyber Physical Systems Result description the search engines listed on this page.Authors: Erkki Jantunen, Urko Zurutuza, Luis Lino Ferreira, Pal VargaJournal title: 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 R&I Objective 1.4: Artificial intelligence for productive, excellent, robust and agile manufacturing chains - Predictive manufacturing capabilities & logistics of the future Comments e) Developing and plugging in digital twin of small-scale formulation process machine (fablab) f) Defining common security and privacy
Show more information
Description Security and sovereignity of information are guaranteed by IDSA (Industrial Data Space Association)-based solutions for on-demand and controlled sharing of data among organisations, regulated by smart
 Data Policy Framework. Result description This public deliverable will report the work of Task 25 It will contain the data policy framework of DigiPrime project and will be the reference document for the data management storage traceability and security
Show more information
Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
 R&I Objective 4.1: Digital platforms and engineering tools supporting creativity and productivity of manufacturing development Comments   However, another implication is that new rules are being developed within SHOP4CF to address novel issues related to privacy, security, safety, legal aspects, or data ownership.
Show more information
Description To manage the IPRs and the supply chain, AVANGARD will implement a hybrid public-private Blockchain platform where the public chain increases security through distributed consensus and validation and the
 Definition of the cloud-based cyber-physical production system architecture Result title Definition of the cloud-based cyber-physical production system architecture
Show more information
Description The initiative for Fostering DIHs for Embedding Interoperability in Cyber-Physical Systems of European SMEs (DIH4CPS) will help European enterprises overcome these innovation hurdles and establish Europe
 D4.7a: CPS for security and wellbeing of shop floor workers Result title D4.7a: CPS for security and wellbeing of shop floor workers Result description D47 CPS for security and wellbeing of shop floor workers M18 M30 The first at M18 describing the preliminary prototype and implementation roadmap and the second at M30 which will document the final prototype
Show more information
 Reference Architecture for IoT Platforms towards Cloud Continuum based on Apache Kafka and Orchestration Methods Result description pre-formated search via the search engines listed on this page.Authors: Zoltán Farkas and Róbert LovasJournal title: Proceedings of the 7th International Conference on Internet of Things, Big Data and SecurityJournal