Projects overview

Sort by

Show more information
Description The heterogeneous nature of the new networks, devices and services will raise a lot of security concerns, such as trust and privacy, that have to be addressed to enable wide deployment of 5G services and
Comments from different companies Addressed processes Supply chain management Enterprise Resource Planning Addressed processes Scheduling Addressed processes Factory Automation Addressed processes Product
 5G Security Architecture Result title 5G Security Architecture Result description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature Result acronym 5G Security Architecture
 Domain 4: Collaborative and mobile enterprises Taxon description • Enabling subcontracting and mitigating hidden capacity risks associated with it.
Show more information
Comments Engineering tools Addressed processes Supply chain management accross factories from different companies Addressed processes Supply chain management CloudBoard[ATC]: facilitates the ecosystem view for
 Domain 4: Collaborative and mobile enterprises Taxon description • Enabling subcontracting and mitigating hidden capacity risks associated with it.
Show more information
Description In addition to the supply chain improvements, the processes inside the company can be addressed and optimised.
Comments Prediction - forecasting Addressed processes See Simulation, as in the COMPOSTION project Simulation & Prediction are addressed in an effectively combined way.
 D4.2 Design of the Security Framework II Result title D4.2 Design of the Security Framework II
 D9.8 Market segmentation and potential of the COMPOSITION in European Industry Result description Therefore, mainly the market for development tools has been addressed.
 Domain 4: Collaborative and mobile enterprises Taxon description • Enabling subcontracting and mitigating hidden capacity risks associated with it.
Show more information
Organisation DYNAMIC & SECURITY COMPUTATIONS SL (ANALISIS-DSC)
Comments It is essential to strengthening the ability to detect, mitigate and recover from risks and cyberattacks to enable a secure operational and tactical DIY4U infrastructure.
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
 R&I Objective 3.4: Secure communication and IP management for smart factories in dynamic value networks Comments It is essential to strengthening the ability to detect, mitigate and recover from risks and cyberattacks to enable a secure operational and tactical DIY4U infrastructure.
Show more information
Description (vii) the automatic monitoring aims will forecast potential risks, and will suggest prevention measures to the broker during the execution of the order.
 VOs Risk Assessment and mitigation Result description Expected value: Although various empirical studies have shown that collaboration risks represent a critical aspect in CNs, very few works have addressed this topic.
 Domain 4: Collaborative and mobile enterprises Taxon description • Enabling subcontracting and mitigating hidden capacity risks associated with it.
Show more information
Comments the integration of virtually any technology Increasing human achievements in manufacturing systems Manufacturing performance characteristics Social sustainability vf-OS as an operating system is addressed
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18)
 vfOS - ID1.1 - Vision Consensus(M3) Result description In addition this document will include an initial risk table, upgraded from the DOA, which itemises RTD risks in particular and including integration.
 Domain 4: Collaborative and mobile enterprises Taxon description • Enabling subcontracting and mitigating hidden capacity risks associated with it.
Show more information
Comments Risks addressed by security ICT performance characteristics Cybersecurity Difficulties in setting up the initial data collection infrastructure on the pilot sites was mitigated through the very
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description For Digital Manufacturing Platforms it addresses necessities and potential risks identified following potential scenario's or within a specific environment.
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments addressed by security ICT performance characteristics Cybersecurity Risk or security assessment ICT performance characteristics Cybersecurity Trustworthy Systems in Platform Lifetime ICT performance
 Summary of selected SCOTT security and safety building blocks Result title Summary of selected SCOTT security and safety building blocks
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description For Digital Manufacturing Platforms it addresses necessities and potential risks identified following potential scenario's or within a specific environment.