Associated projects

Show all
Showing 5 out of 5
Show more information
Description In addition to the supply chain improvements, the processes inside the company can be addressed and optimised.
  Design of the Security Framework I Result title Design of the Security Framework I
  Design of the Security Framework II Result title Design of the Security Framework I
  Digital Factory Model II Result description The next parts describe both the well-known standards were analysed and some of them used in DFM’s design and implementation.
  Lessons Learned and updated requirements report II Result comments Specific use case requirements Lessons learned
  Standards Taxon title Standards Search keywords Standards
  Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
  Prediction - forecasting Comments See Simulation, as in the COMPOSTION project Simulation & Prediction are addressed in an effectively combined way.
Show more information
  Design and Implementation of Security and Privacy for Core Business Services Result title Design and Implementation of Security and Privacy for Core Business Services Result description A design and implementation report on privacy and security services
  Standards Taxon title Standards Search keywords Standards
  Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
  Resilience Comments Resilience is partly addressed through the federation aspects: attackers need to “hack” more than one platform, each with a different security setup, chosen from NIMBLE modules.
Show more information
  vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18)
  vfOS - ID10.3a - Impact Activity Reports(M9) Result description Finally, it will include reporting related to T10.5 Standards, Clustering and Inter-project Cooperation
  vfOS - ID1.2 - Users scenarios characterisation(M4) Result comments result_rcn_EC deliverableType_EC Documents, reports Specific use case requirements
  Standards Taxon title Standards Search keywords Standards Comments IO Toolkit to implement connectors to devices or business software and specific implementations for OPC UA and MQTT. Other standards as ANSI/ISA-95 will be followed.
  Cybersecurity Taxon description Security for information and infrastructure related to digital systems 
  Integration level interoperability Comments IO Toolkit to implement connectors to devices or business software and specific implementations for OPC UA and MQTT. Other standards as ANSI/ISA-95 will be followed.
Show more information
Description UPTIME will enable manufacturing companies having installed sensors to fully exploit the availability of huge amounts of data with respect to the implementation of a predictive maintenance strategy.
  Specific use case requirements Taxon title Specific use case requirements Search keywords Specific
  Cloud computing Taxon description   Considerations need to be made to security measures in the cloud (kubernetes, container security), identity & access, or carefully considering the security measures by the respective
  Economic sustainability Comments The economic impact of UPTIME is the most important one and can be seen at 2 levels : Short/mid-term impact: improvement of financial results of industrial companies and their
Show more information
  D7.2: Use Case I (Machinery Maintenance) Definition II Result description The final one will help specify what needs to be done in the use case implementation.
  D8.2: Use Case II (Automotive) Definition II Result description The final one will help specify what needs to be done in the use case implementation.
  Standards Taxon title Standards Search keywords Standards
  Cybersecurity Taxon description Security for information and infrastructure related to digital systems