Projects overview

Sort by


Show more information
Comments Cybersecurity ICT performance characteristics Security and privacy risk assessment to identify countermeasures to be included in the A4BLUE framework.
 White paper - Human-centred factories from theory to industrial practice. Lessons learned and recommendations Result description The core target groups of this report are people in academia, industry practitioners and policy makers at the local, national and EU levels.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description need to be addressed in order to progress on the pathways be inspired by industrial and research cases and share your experience and cases engage with stakeholders at European, national and regional level
Organisation LEUVEN SECURITY EXCELLENCE CONSORTIUM L-SEC VZW
Comments super_admin H2020-FOF-2016 Other eco-system aspects Business model aspects Business ecosystems associated to digital platforms Business ecosystems Interoperability (ICT) ICT performance characteristics Cybersecurity
 Key enablers and cross-cutting factors Result description Security is a requirement that may become increasingly important while progressing on the pathway.
 Data ownership - data governance Taxon description How is fairness/ a level playing field between the platform and smaller players ensured ?
Show more information
Comments Cybersecurity ICT performance characteristics Resilience ICT performance characteristics Scalability ICT performance characteristics Work station Manufacturing system levels Manufacturing system levels
 CPS Data Model Architecture - M12 release Result description Report on the CPS data models and ontologies of the project, including techniques for their aggregation into higher level data models. This is the first of two incremental releases.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Work station Manufacturing system levels Manufacturing system levels Enterprise - Factory Manufacturing system levels Manufacturing system levels Factory-level Showcase. Plant-level Showcase.
 Daedalus proof-of-concept showcases - 4 Result description Daedalus proof-of-concept showcases - plant-level
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Cybersecurity ICT performance characteristics DIGICOR will develop holistic security and governance mechanisms to ensure the access, data transfer and collaborations are protected at the platform level
 D5.10 DIGICOR Data Models Implementation Result description This  deliverable  provides  a  top-level  view  on  semantic  data  models  that  represent  the information backbone of the DIGICOR platform
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Cybersecurity ICT performance characteristics Data Analytics and Complex Event Processing will deal with semantic interoperability and security at lower data acquisition layers Scalability ICT performance
 D3.1: DESIGN OF DECISION SUPPORT TOOLKIT Result description within the DISRUPT project to cover the project objectives and building upon the use case requirements and specifications, and c) to define on a methodological (and not on a technical or architectural) level
 Cybersecurity Taxon title Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
Show more information
Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 Final EU-level End-of-project Event Result title Final EU-level End-of-project Event
 Security and Privacy Requirements Result description A report summarizing privacy and security requirements
 Cybersecurity Taxon title Cybersecurity Comments Advanced behavioural security (including game theory) Spring Cloud Security: Standardized security mechanisms are implemented using Spring Cloud Security.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments Emphasizing security, privacy & trust based on situational awareness.
 Methodology for SPT for Product Data and Configurations Result description This deliverable details the methodological approach and detailed derived security requirements for the SPT Framework and how it will serve the SAFIRE infrastructure.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Data ownership - data governance Comments Emphasizing security, privacy & trust based on situational awareness.
 Data collection, storage, analytics, processing and AI Comments Emphasizing security, privacy & trust based on situational awareness.
Show more information
Comments security.
 Z-PREVENT Validation and Verification of KPIs Result description The models for the 5 KPIs (Productivity, Efficiency, Quality (Customer Satisfaction), Environmental Impact, and Inventory levels) will be measured and fine-tuned.
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 A Security Architecture for Digital Manufacturing Platforms Comments security.
Show more information
Comments level interoperability ICT performance characteristics General interoperability framework Interoperability (ICT) Cybersecurity ICT performance characteristics Occupational safety and health Manufacturing
 Foresee Cluster - Predictive maintenance technologies for production systems. A roadmap to development and implementation. Result description The core target groups of this report are industry practitioners, people in academia and policy makers at the local, national and EU levels.
 Cybersecurity Taxon title Cybersecurity
 RP 3.4 Energy monitoring and management in future manufacturing enterprises Taxon description Energy savings areas in the production environment have to be considered from different perspectives: component level, field level, machine level, process and plant level.
Show more information
Description However, the vision of future intelligent and autonomous manufacturing units is counterbalanced by exponential increase in security risks and attack surfaces that emerge as the production systems grow
Organisation THALES COMMUNICATIONS & SECURITY SAS (THA-C&S)
 The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result title The COLLABS Level-1 Security Package for Securely Connected Objects: MVP Result description The COLLABS Level-1 Security Package for Securely Connected Objects: MVP
Show more information
Comments advanced data analytics, thus contributing to the competitiveness and resource efficiency of manufacturing SMEs, ultimately fostering the vision of Factories 4.0 and the circular economy RP 3.5 Multi-level
 High-level Description of Cloud Applications using TOSCA Result title High-level Description of Cloud Applications using TOSCA
 Optimizing efficiency of truck components manufacturing processes by data analytics Result description Moreover, the project will let more innovative and competitive technology suppliers, in particular SMEs, both on the level of ICT and on the level of manufacturing equipment, able to supply manufacturers
 RP 3.5 Multi-level simulation and analytics for improving production quality and throughput Taxon title RP 3.5 Multi-level simulation and analytics for improving production quality and throughput Taxon description Integrated multi-level simulation systems will facilitate enhanced factory modelling by enabling views and interpretations from different perspectives that are aimed at providing stakeholders with different
Show more information
Description Security and sovereignity of information are guaranteed by IDSA (Industrial Data Space Association)-based solutions for on-demand and controlled sharing of data among organisations, regulated by smart
 Operational Services (OS) Result description Circular oriented (CO) services are developed at the operational level, within the platform federation nodes.
Show more information
Comments security policy Modular Design and Deployment Approaches ICT performance characteristics Application level interoperability General interoperability framework Interoperability (ICT) Dockerised components
 vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18)
 vfOS - ID1.5 - Requirements Specification(M6) Result description This deliverable will be a joint document for the requirements of all project components, divided into strategic, high level functional and technical requirements.
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Comments technologies Industrial Reference ICT Architectures ICT performance characteristics Interoperability (ICT) Autonomous Smart Factories Pathway Pathways Interoperability (ICT) ICT performance characteristics Cybersecurity
 QU4LITY SPT Framework (Version 1) Result description Prototype implementation of the SPT framework, which will enable dynamic and flexibly reconfigurable security policies. It will be based on task T3.5;
Show more information
Description Data across the (multi-sided) company internal value chain is integrated by the IIMS with optimisation and modelling tools for resource management including innovative, multi-level, real-time
Comments Cybersecurity ICT performance characteristics Security by design approach.
 Fill-Level Sensors Result title Fill-Level Sensors
 Design of the Security Framework II Result description A public report, led by ATOS, documenting the Design of the Security Framework; this updates D4.1
 Cybersecurity Taxon title Cybersecurity
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
Show more information
Description Ultimately, SCOTT will foster Europe’s independence for security enabling components and systems and will further boost the growing “internet economy”.
Comments ICT performance characteristics Cybersecurity A Security Architecture for Digital Manufacturing Platforms ICT performance characteristics Cybersecurity Specific security standard(s) addressed and impact
 Carbon dioxide level prediction for indoor air using neural networks Result title Carbon dioxide level prediction for indoor air using neural networks
 Demonstrator Generation 3 Result description This demonstration shall be also subject to an extensive security and privacy evaluation
 Platform level interoperability Taxon title Platform level interoperability
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.