Results, demos etc. overview

Sort by

Showing 1 to 27 of 27 entries

Roadmap towards Services

Project: SCOTT

Type:

Updated at: 03-02-2021

Show more information
Description Drivers like energy efficiency, trust issues such as privacy and security, convenience, as well as market aspects such as societal demands will be analysed to create the expected market uptake of managed

Market innovation

Project: SCOTT

Type:

Updated at: 03-02-2021

Show more information
Description This document will bring together the knowledge from task 1 and 2 towards the innovations from SCOTT towards the market, addressing the introduction of more secure and privacy-aware technologies, applications

ISO/IEC 27701:2019

Project:

Type:

Updated at: 23-10-2020

Show more information
Description Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
Comments ISO/IEC 27701:2019 - extension to privacy information management requirements and guidelines Standards, standardisation, certification and regulation ISO 27000 - Information Security Management International

Trust and Privacy Framework

Project: HUMAN

Type:

Updated at: 13-03-2020

Show more information
Title Trust and Privacy Framework
Description The deliverable will document the methodology of engaging with the end-users and the results of the work, listing the set of trust and privacy guidelines categorized according as functional or technical
Show more information
Title Design and Implementation of Security and Privacy for Core Business Services
Description A design and implementation report on privacy and security services
Comments result_rcn_EC admin deliverableType_EC admin Documents, reports Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Common digital platform used for tenders and bidding

Google Cloud Platform: Alstom

Project:

Type:

Updated at: 09-08-2019

Show more information
Comments Virtual machines are instantiated in zones aligned with customer security requirements, to enforce data privacy.
 Back-up summary Comments Virtual machines are instantiated in zones aligned with customer security requirements, to enforce data privacy.
Show more information
Title Privacy, Security and Data Protection in product-service design First
Description Privacy, Security and Data Protection in product-service design
Comments result_rcn_EC admin deliverableType_EC admin Other Cybersecurity ICT performance characteristics Privacy ICT performance characteristics Collaborative Product-Service Factories Pathway Digitalisation

5G Security and Privacy Enablers

Project: 5G-Ensure

Type:

Updated at: 23-06-2018

Show more information
Title 5G Security and Privacy Enablers
Comments Manufacturing Applications areas and sectors The heterogeneous nature of the new networks, devices and services will raise a lot of security concerns, such as trust and privacy, that have to be addressed

5G Test-bed

Project: 5G-Ensure

Type: /

Updated at: 23-06-2018

Show more information
Description The test-bed set-up meets the requirements of the 5G security and privacy enablers against the threats emerging from  identified use cases.

Context-Aware Manager

Project: SatisFactory

Type:

Updated at: 21-06-2018

Show more information
Description Privacy preservation is also in scope of this component, where required. 3) Gesture & Content Recognition Manager: The Gesture & Content Recognition Manager (GCRM) is devoted to the analysis of