H2020-DS-2015-1 Digital security: cybersecurity, privacy and trust

English
Source: 
Participant Portal
Publication Date: 
Wednesday, 25 March 2015
Deadline: 
Thursday, 27 August 2015
Overview and objectives: 

This Call will thus focus on demonstrating the viability and maturity of state-of-the-art security, privacy and trust solutions that have been tested in a laboratory environment. The intention is that after this validation phase they will find a wide up take in the market. Proving that the security concepts, processes and solutions work in a real life environment, in large scale demonstrators and directly involving end users who would ultimately benefit the most from the outcome, should increase the prospects for an ICT security market and demonstrate the validity and effectiveness of security. This in turn will reduce the risks of a negative economic impact due to a cyber-incident.
However, there is still a large number of unresolved cybersecurity, privacy and trust issues that necessitate longer term research. Constantly new questions come up due to the evolution of ICT or the usage made thereof. Digital security is an issue cutting across all ICT technology, components, applications or services. Generic research is thus needed addressing those more fundamental and ubiquitous questions. Therefore, this call is complementary to the Cybersecurity and Trustworthy ICT activities supported under the "Information and Communnication (ICT)' theme of the 'Leadership in Enabling and Industrial Technologies' (LEIT) pillar of H2020 where those longer term issues are addressed.

Actions: 
  • DS-03-2015: The role of ICT in Critical Infrastructure Protection: Communication and computing networks are not only critical infrastructures on their own, but  underpin many other critical networks (e.g. energy, transport, finance, health …). In addition they are critically dependent on ICT technology. Therefore, the malfunctioning or disruption of the communication channel or of an IT system will have a cascading effect, on several other infrastructures or services that depend on it, potentially across all Europe. Proposals should investigate the dependencies on communication networks and ICT components (including SCADA and IACS systems) of critical infrastructures, analyze and propose mitigation strategies and methodologies for assessing criticalities of services and detecting anomalies, developing tools and processes to simulate or monitor cascading effects due to ICT incidents, and develop self-healing mechanisms. ICT should be protected or re-designed at the software level, but also at the physical level, leading to more robust, resilient and survivable ICT infrastructure.

Type of action: Innovation Actions

  • DS-04-2015: Information driven Cyber Security Management: Effective decision making, early warning systems and cyber security management requires tools and techniques that enable organisations to efficiently process the flow of information from both internal and external sources, through improved information processing, analysis and, where necessary, exchange; as well as to manage the implementation of cyber security solutions. The tools and techniques should leverage the state-of-the-art in areas such as SIEM, data analytics (including Big Data) and visualisation, threat intelligence, malware analysis and cyber security information exchange. Taking into account the large variety of IT systems and architectures in use today, the projects should strive to promote interoperability through the use of globally accepted open standards and wider uptake of any proposed solutions.

Type of action: Innovation Actions

  • DS-05-2015: Trust eServices: The implementation of trust eServices in specific applications areas like health, public administration, eCommerce includes the provision of electronic signatures, e-seals, timestamps or certified electronic delivery. The deployment and widespread adoption of these eServices is hampered by the lack of globally interoperable solutions, mutually recognized or compatible trust models and the absence of solid business cases for the reliance on electronic signatures, e-seals, timestamps or certified electronic delivery. In addition, the impossibility of transparently assessing the security assurance and trustworthiness of such eServices, in particularly when coming from third countries makes it difficult for citizens and businesses to confidently rely on them. The objective is to devise demonstrators for the automated comparison and interoperability of electronic trust services covering aspects such as security assurance levels, operational security audits, state supervision systems, data protection regimes or liability of trust service providers. Solutions should rely on state-of-the-art technology, interoperability linking existing electronic identification and authentication systems, taking into account different jurisdictions. Key elements of the initiative will be the differential assessment of technical and organisational standards for trust services, as well as the development of a framework for 'global trust lists'.

Type of action: Innovation Actions

  • DS-07-2015: Value-sensitive technological innovation in Cybersecurity:In particular, work in this topic should focus on developing ways to determine the relation between the perceived risks and benefits of new technologies in the field of digital security and their associated acceptability and acceptance; defining mechanisms to determine how our fundamental values and rights can be taken into account in the development process of new technologies to ensure that they are applied when used in innovative services and products; proposing rules and guidance on how these new technologies will safeguard these values and rights; identifying existing best practices on cybersecurity norms and rules accommodating European values and rights; drafting standards and guidelines for industry and the public sector to enable consumers to exert a high level of control over devices and services as well as to ensure accountability with respect to the acceptable usage of new digital technologies; and identifying the key factors for promoting a secure and innovative ecosystem through fostering the creation of secure technologies in line with European values.

Type of action: Coordination and Support Actions

Budget available: 
€50 210 000.00
Beneficiaries: 
Developed programme: 

Horizon 2020: Societal Challenges

Horizon 2020 reflects the policy priorities of the Europe 2020 strategy and addresses major concerns shared by citizens in Europe and elsewhere.A challenge-based approach will bring together resources and knowledge across different fields, technologies and disciplines, including social sciences and the humanities. This will cover activities from research to market with a new focus on innovation-related activities, such as piloting, demonstration, test-beds, and support for public procurement and market uptake.

English
Plataforma tecnológica cofinanciada por: