Innovating Works
HORIZON-JU-SNS-2022-STREA...
HORIZON-JU-SNS-2022-STREAM-A-01-06: Trustworthy and Reliable End-to-end connectivity Software platforms
Sólo fondo perdido 0 €
Comunidad autónoma
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 26-04-2022.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio..
Esta ayuda financia Proyectos:

ExpectedOutcome:Novel technologies/methods for ensuring Trust and Reliability, evolving 5G, in a very distributed multi-stakeholder context, extending the concept of edges from small CPEs and IoT devices to regional datacentres, enabling full control over end-to-endend-to-end data flows and trust on the execution environments.Further evolving security of 5G towards the notion of building and maintaining Trust in deployed and interconnected 5G systems and services.An open, flexible architecture, for evolved 5G, able to cope with widely distributed, federated, and dynamic systems for data processing, data storage and communication tackling data reliability challenges.The outcome should build trust and reliability, significantly advanced beyond the baseline security measures of 5G.
Objective:Please refer to the "Specific Challenges and Objectives" section for Stream A in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.


Scope:The work addresses the reliability/trust challenges created by fully virtualized solutions, increased network programmability, extended network exposure and tight integration to servi... ver más

ExpectedOutcome:Novel technologies/methods for ensuring Trust and Reliability, evolving 5G, in a very distributed multi-stakeholder context, extending the concept of edges from small CPEs and IoT devices to regional datacentres, enabling full control over end-to-endend-to-end data flows and trust on the execution environments.Further evolving security of 5G towards the notion of building and maintaining Trust in deployed and interconnected 5G systems and services.An open, flexible architecture, for evolved 5G, able to cope with widely distributed, federated, and dynamic systems for data processing, data storage and communication tackling data reliability challenges.The outcome should build trust and reliability, significantly advanced beyond the baseline security measures of 5G.
Objective:Please refer to the "Specific Challenges and Objectives" section for Stream A in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.


Scope:The work addresses the reliability/trust challenges created by fully virtualized solutions, increased network programmability, extended network exposure and tight integration to service providers and non-public networks spanning the business actors of the value-chain. It includes:

Secure and reliable technologies for efficient containers and smart and secure container orchestration, with reliable software virtualization, with fast instantiations and mobility support seen as promising primitives for supporting these novel security architectures, and subsequently be transferred to standardization bodies.Support of flexible security policies in very distributed (and continuously changing) settings complementing traditional perimeter protection technologies.Holistic approaches to reliability, spanning the lifecycle of smart networks and services.Novel requirements from challenging verticals, jointly using secure software engineering and operational procedures to manage risks across multiple stakeholders including quantification of security attributes and communication of associated risk for stakeholders.Better tools for initial ‘security by design’ and for creation of “safer” code, collaborative methods, and run-time tools to manage risks, and measures to cope with new developments in areas such as AI.Virtualisation of security functions (Protection, detection, remediation) and Exposure and integration of security services (MSSP, NOC-SOC interactions).Enablement of service and infrastructure providers (including end-users) to enter into agreements with infrastructure maintainers, based on the capabilities of the SBA-architectures, to provide storage and/or communication of data without the need for all parties to trust each other.Adherence with and improvements of efficient data sovereignty strategies in different domains (including bridging public and private networks) by enabling secure applications in different vertical domains should be demonstrated notably through measurable/observable outputs in terms of trust in networked components and subsystems.The definition of a security verification policy and associated credentialing of the secure communication system capability via the development and testing in accordance with processes that allow guaranteeing the required level of security in a way that is accepted by all service providers and system developers, especially with respect to the notion of trust.
ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Comunidad autónoma :
Solo pueden aplicar a esta linea las empresas con sede en:
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: *Presupuesto para cada participante en el proyecto ¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Subcontracting costs.
Purchase costs.
Other cost categories.
Indirect costs.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 4:. Es el primer paso para determinar si los componentes individuales funcionarán juntos como un sistema en un entorno de laboratorio. Es un sistema de baja fidelidad para demostrar la funcionalidad básica y se definen las predicciones de rendimiento asociadas en relación con el entorno operativo final. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
Para el presupuesto subvencionable la intensidad de la ayuda en formato fondo perdido podrá alcanzar como minimo un 100%.
The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations. The funding rate for RIA projects is 100 % of the eligible costs for all types of organizations.
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.