Design of the Security Framework II

Summary
A public report, led by ATOS, documenting the Design of the Security Framework; this updates D4.1
Structured mapping
Unfold all
/
Fold all
Exploitable result(s)
Key documentation on exploitable results
Report - Video - Presentation - Publication....?
Report
ICT performance characteristics
Cybersecurity
Pathways
System resource tags
CORDA