• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Facebook
  • Instagram
  • LinkedIn
  • TikTok
  • Twitter
  • YouTube
CDE Almería – Centro de Documentación Europea – Universidad de Almería

CDE Almería - Centro de Documentación Europea - Universidad de Almería

Centro de Documentación Europea de la Universidad de Almería

  • HOME
  • WHAT´S ON
    • EU BULLETINS
    • EU NEWS
    • Activities
    • EU Calls and Awards
    • Radio Program «Europe with You»
  • DOCUMENTATION
    • Bibliographic Collection
      • Almería EDC Digital Collection
      • UNIVERSITY OF ALMERIA LIBRARY
    • Documentation by topic
    • EU Media Collection
      • Web Space
      • MEDIATHEQUE REPOSITORY
  • Europe on the net
    • Institutions
    • EU Representation in Spain
    • European information network of Andalusia
    • EU official journal
  • ABOUT US
    • Presentation
    • People
    • Contact
  • English
  • Spanish

H2020: Information and Communication Technologies: Building blocks for resilience in evolving ICT systems

Inicio » EU Calls and Awards » H2020: Information and Communication Technologies: Building blocks for resilience in evolving ICT systems

14 de October de 2019

Algorithms, software and hardware systems must be designed having security, privacy, data protection, fault tolerance and accountability in mind from their design phase in a measurable manner, taking into account future-proof, advanced cryptographic means. 

Relevant challenges include: (a) to develop mechanisms that measure the performance of ICT systems with regards to cybersecurity and privacy and (b) to enhance control and trust of the consumer of digital products and services with innovative tools aiming to ensure the accountability of the security and privacy levels in the algorithms, in the software, and ultimately in the ICT systems, products and services across the supply chain.

Scope

Proposals are invited against at least one of the following three subtopics:

a) Cybersecurity/privacy audit, certification and standardisation

Innovative approaches to (i) design and develop automated security validation and testing, exploiting the knowledge of architecture, code, and development environments (e.g. white box) (ii) design and develop automated security verification at code level, focusing on scalable taint analysis, information-flow analysis, control-flow integrity, security policy, and considering the relation to secure development lifecycles, (iii) develop mechanisms, key performance indicators and measures that ease the process of certification at the level of services and (iv) develop mechanisms to better audit and analyse open source and/or open license software, and ICT systems with respect to cybersecurity and digital privacy. These approaches may be accompanied by creating information bases to measure and assess the security of digital assets. Proposals should make use of existing standards to the extent possible, and should strive to contribute to relevant standardisation efforts.

b) Trusted supply chains of ICT systems

Innovative approaches to (i) develop advanced, evidence based, dynamic methods and tools for better forecasting, detecting and preventing propagated vulnerabilities, (ii) estimate both dynamically and accurately supply chain cyber security and privacy risks, (iii) design and develop security, privacy and accountability measures and mitigation strategies for all entities involved in the supply chain, (iv) design and develop techniques, methods and tools to better audit complex algorithms (e.g. search engines), interconnected ICT components/systems (v) devise methods to develop resilient systems out of potentially insecure components and (vi) devise security assurance methodologies and metrics to define security claims for composed systems and certification methods, allowing harmonisation and mutual recognition based primarily on evidence and not only on trust.

The trusted supply chain for ICT systems/components should be considered by proposals in its entirety, in particular by addressing the IoT ecosystems/devices that are part of the supply chain.

c) Designing and developing privacy-friendly and secure software and hardware

Innovative approaches to establish methods and tools for (i) security and privacy requirements engineering (including dynamic threat modelling, dynamic attack trees, attack ontologies, dynamic taxonomies and dynamic, evidence based risk analysis), (ii) embedded algorithmic accountability (in order to monitor the security, privacy and transparency of the algorithms/software/systems/services), (iii) system-wide consistency including connection between models, security/privacy/accountability objectives, policies, and functional implementations, (iv) metrics to assess a secure, reliable and privacy-friendly development, (v) secure, privacy-friendly and accountability-enabled programming languages (including machine languages), hardware design languages, development frameworks, as well as secure compilation and execution, (vi) novel, secure and privacy-friendly IoT architectures enabling consistent trustworthy and accountable authentication, authorization and accounting services across IoT devices/ecosystems with enhancement of Public Key Infrastructures (PKIs) aiming to support PKI services (e.g. registration, revocation) for IoT devices.

For each of the sub-topics above, the outcome of the proposals is expected to lead to development up to Technology Readiness level (TRL) 5.

The Commission considers that proposals requesting a contribution from the EU of between EUR 4 and 5 million would allow this area to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

For grants awarded under this topic for Research and Innovation Action the Commission or Agency may object to a transfer of ownership or the exclusive licensing of results to a third party established in a third country not associated to Horizon 2020. The respective option of Article 30.3 of the Model Grant Agreement will be applied.

Expected Impact

Short/medium term

  • Improved market opportunities for the EU vendors of security components.
  • Increased trust both by developers using/integrating the ICT components and by the end-users of IT systems and services.
  • Protect the privacy of citizens and trustworthiness of ICT .
  • Acceleration of the development and implementation of certification processes.

Long term

  • Advanced cybersecurity products and services will be developed improving trust in the Digital Single Market.
  • The use of more harmonized certification schemes will increase the business cases for cybersecurity services as they will become more reliable.
  • Validation platforms will provide assessments with less effort compared with nowadays and assure a better compliance with relevant regulations and standards.

Deadline

19 Novvember 2019  17:00 Brussels time

More information

Call

Publicaciones relacionadas:

H2020: Spreading Excellence and Widening Participation: Twinning computing ordenador tecnologíasH2020: European High-Performance Computing Joint Undertaking Annual Work Plan 2019: HPC Competence Centres H2020: programme: Towards the next EU Framework Programme for Research and Innovation: EIC Horizon Prize for ‘Innovative Batteries for eVehicles’ H2020: Secure, clean and efficient energy. Demonstration of advanced biofuels production from aquatic biomass H2020: Nanotechnologies, Advanced Materials, Biotechnology and Advanced Manufacturing and Processing: Reprogrammed microorganisms for biological sensors (IA)

“This is a space for debate. All comments, for or against publication, that are respectful and do not contain expressions that are discriminatory, defamatory or contrary to current legislation will be published”.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Publicaciones relacionadas


H2020: Spreading Excellence and Widening Participation: Twinning


computing ordenador tecnologíasH2020: European High-Performance Computing Joint Undertaking Annual Work Plan 2019: HPC Competence Centres


H2020: programme: Towards the next EU Framework Programme for Research and Innovation: EIC Horizon Prize for ‘Innovative Batteries for eVehicles’


H2020: Secure, clean and efficient energy. Demonstration of advanced biofuels production from aquatic biomass


H2020: Nanotechnologies, Advanced Materials, Biotechnology and Advanced Manufacturing and Processing: Reprogrammed microorganisms for biological sensors (IA)

Footer

Logotipo en negativo del Centro de Documentación Europea de Almería
  • CDE Almería
  • Edificio Parque Científico-Tecnológico (Pita)
  • Planta: 1ª, Despacho: 2904120.
  • Ctra. Sacramento s/n. Almería (Spain)
  • Teléfono: (+34) 950 015266

HOME
NEWS
DOCUMENTATION
EUROPE ON THE NET
ABOUT US

  • LEGAL NOTICE
  • PRIVACY POLICY
  • COOKIE POLICY
  • ACCESSIBILITY
  • SITEMAP

Copyright © 2023 CDE Almería · Creative Commons LicenseThis work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

<p>El Centro de Documentación Europea de la Universidad de Almería utiliza cookies propias y de terceros para facilitar al usuario la navegación en su página Web y el acceso a los distintos contenidos alojados en la misma. Asimismo, se utilizan cookies analíticas de terceros para medir la interacción de los usuarios con el sitio Web. Pinche el siguiente enlace si desea información sobre el uso de cookies y como deshabilitarlas. ajustes</p>

Politica de privacidad

El Centro de Documentación Europea de la Universidad de Almería utiliza cookies propias y de terceros para facilitar al usuario la navegación en su página Web y el acceso a los distintos contenidos alojados en la misma. Asimismo, se utilizan cookies analíticas de terceros para medir la interacción de los usuarios con el sitio Web. Pinche el siguiente enlace si desea información sobre el uso de cookies y como deshabilitarlas. <a href="/politica-de-cookies" rel="noopener" target="_blank">Más información</a>

Cookies estrictamente necesarias

Las cookies estrictamente necesarias tiene que activarse siempre para que podamos guardar tus preferencias de ajustes de cookies.

Básicamente la web no funcionara bien si no las activas.

Estas cookies son:

  • Comprobación de inicio de sesión.
  • Cookies de seguridad.
  • Aceptación/rechazo previo de cookies.

Si desactivas esta cookie no podremos guardar tus preferencias. Esto significa que cada vez que visites esta web tendrás que activar o desactivar las cookies de nuevo.

Cookies de terceros

Esta web utiliza Google Analytics, Google Tag Manager y Yandex Metrika para recopilar información anónima tal como el número de visitantes del sitio, o las páginas más populares.

Dejar estas cookies activas nos permite mejorar nuestra web.

¡Por favor, activa primero las cookies estrictamente necesarias para que podamos guardar tus preferencias!

Política de cookies

Pinche el siguiente enlace si desea información sobre el uso de cookies y como deshabilitarlas. Más información