Physical Security refers to the part of physical access control, borders, gates, identity verfication, passport control, manned guard services, videosurveillance, biometrics and related components. Physical security also considers physical attacks such as terrorist and criminal attacks, fire and water challenges. 

 

This is an index-based search using 'Physical security' as the searched string. Please note that for some items this may result in less relevant search results. The 'directly mapped' search might generate less search results, but more relevant search results.

Associated projects

Project search
Showing 10 out of 32
Show more information
Description the delivery of innovative products and services, in accessing new markets, in fund-raising; skills building services (serious and role games, participative lessons and webinars, virtual experiments in physical
 Periodic Reporting for period 1 - MIDIH (Manufacturing Industry Digital Innovation Hubs) Result description In parallel the alignment of the MIDIH RA with the IDSA Reference Architecture Model v3.0, will be also key to cover the security aspects in the industrial cyber physical systems to guaranty security,
Show more information
Comments Security by design approach.
 Development and installation fo a WSN physical security system Result title Development and installation fo a WSN physical security system
 Viability of WSN as ICT overlay for physical security detection Result description For physical security detection and determination, a number of typical sensors used for security purposes are covered.
 Connectors for Inter-factory Interoperability and Logistics II Result comments necessary security features as authentication, authorization, message integrity and message traceability.
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems  Comments Security by design approach.
Show more information
Description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
Comments Some of the security mechanisms being developed in the project include: Advanced pairing-based cryptography (e.g., Attribute-Based Encryption-ABE), Semantic multi-aspect access and usage control, Security-aware
 Periodic Reporting for period 1 - DIGICOR (Decentralised Agile Coordination Across Supply Chains) Result description The solution is based on an open platform integrating tools and services and implementing case specific governance rules and procedures for collaboration, knowledge protection, and security.
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems  Comments Some of the security mechanisms being developed in the project include: Advanced pairing-based cryptography (e.g., Attribute-Based Encryption-ABE), Semantic multi-aspect access and usage control, Security-aware
Show more information
Comments CFG has worked on a SOTA security framework. Integrity of data models etc. is of paramount importance for the acceptance by clients. see 3.3
 Numerical modelling and simulation of heat treating processes Result description Creating a numerical model of whole water quench with all necessary details and containing all physical processes are the challenges to be faced. Result comments Specific use case requirements Creating a numerical model of whole water quench with all necessary details and containing all physical processes are the challenges to be faced.
 System modelling, simulation and forecasting Taxon description The act of simulating something first requires that a model be developed; this model represents the key characteristics, behaviors and functions of the selected physical or abstract system or process.
Show more information
Comments Implementation of security mechanism on the Z-Fact0r platform components, to achieve security.
 Risks addressed by security Taxon title Risks addressed by security
 A Security Architecture for Digital Manufacturing Platforms Taxon description To avoid physical harm, collateral damage other safety or cybersecurity issues, having a Security Architecture supporting the Digital Manufacturing Platforms should allow developers and companies at least Comments Implementation of security mechanism on the Z-Fact0r platform components, to achieve security.
Show more information
Comments Security and privacy risk assessment to identify countermeasures to be included in the A4BLUE framework.
 Periodic Reporting for period 1 - A4BLUE (Adaptive Automation in Assembly For BLUE collar workers satisfaction in Evolvable context) Result description s physical or cognitive characteristics, skills, etc.) or production related variability as well as long term changes caused by market`s demands, technology advancements or demographic trends (e.g. reduced
 Cybersecurity Taxon description Security for information and infrastructure related to digital systems  Comments Security and privacy risk assessment to identify countermeasures to be included in the A4BLUE framework.
Show more information
Comments Digital models enahnced with real world data acquired from sensor devices will be used as the basis of physical phenomena that affect the operational condition of the equipment, such
 Periodic Reporting for period 1 - SERENA (VerSatilE plug-and-play platform enabling remote pREdictive mainteNAnce) Result description The definition and design of the security middle-ware for the cloud platform.
 Data acquisition Taxon description The components of data acquisition systems include: Sensors, to convert physical parameters to electrical signals. Comments Digital models enahnced with real world data acquired from sensor devices will be used as the basis of physical phenomena that affect the operational condition of the equipment, such
 System modelling, simulation and forecasting Comments Digital models enahnced with real world data acquired from sensor devices will be used as the basis of physical phenomena that affect the operational condition of the equipment, such
Show more information
Description (including physical-based models of the critical components and a data driven approach) Determining an optimal strategies and policies for the maintenance activities of each equipment component.
Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with
 Periodic Reporting for period 1 - PROGRAMS (PROGnostics based Reliability Analysis for Maintenance Scheduling) Result description Physical Layer: the data monitoring tool on which the predictive maintenance techniques rely is deployed at factory level; 2.
 AAA - Access, Authorisation and Authentication Taxon description As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls.
 Process reliability - dependability Comments Implement SotA security layers, showing that the security of maintenance data transmission methods is on par with

Associated results & demonstrators

Result search
Showing 10 out of 16