Innovating Works
ICT-32-2014
ICT-32-2014: Cybersecurity, Trustworthy ICT
Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 23-04-2014.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Número mínimo de participantes.
Esta ayuda financia Proyectos: Objetivo del proyecto:

Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.

The challenge is to find solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities.

Scope:

a.      Research & Innovation Actions

         Security-by-design for end-to-end security

Security-by-design paradigms have to be developed and tested, to providing end-to-end security, across all hardware and software layers of an ICT system and application and business services. Special attention has to be paid to the interaction of the layers and to a holistic approach. Platform independent solutions are needed to provide context aware and self-adaptive security in highly connected, complex and interoperable networks.

Automated... ver más

Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.

The challenge is to find solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities.

Scope:

a.      Research & Innovation Actions

         Security-by-design for end-to-end security

Security-by-design paradigms have to be developed and tested, to providing end-to-end security, across all hardware and software layers of an ICT system and application and business services. Special attention has to be paid to the interaction of the layers and to a holistic approach. Platform independent solutions are needed to provide context aware and self-adaptive security in highly connected, complex and interoperable networks.

Automated security policy governance for such environments has to be addressed, allowing for run-time verification, customisation and enforcement between operators or virtual entities, in multi-layer and multi-service systems, spanning multiple domains or jurisdictions.

Open and dynamically reconfigurable environments need special attention, as well as environments where the user or provider has to rely on other providers, not necessarily of trustworthy origin.

The developed security-by-design solutions are expected to be usable in their deployment and implementation in order to decrease the security risks associated with improper use or misconfiguration and thereby allowing the user to trust devices and services intuitively.

         Cryptography

Research projects have to address the key challenges to guarantee the security for the lifespan of the application it supports, to stay ahead of the evolution of the ICT environment and keep pace with the performance increase of ICT technology. The challenges to be addressed include:

-       Resource efficient and highly secure technology for hardware based real-time cryptography;

-       Resource efficient, real-time, highly secure fully homomorphic cryptography;

-       Distributed cryptography including functional cryptography;

-       Cryptographic tools for securely binding applications to software, firmware and hardware environments, with or without the possibility to adapt the cryptographic primitives which are used;

-       Post-quantum cryptography for long term security;

-       Quantum key distribution (QKD) systems and networks for long-term security by design, as well as networks supporting information theoretic cryptographic primitives, including but not restricted to the integration into existing optical networks (e.g. trusted nodes and/or using multiplexing), addressing:

                                        i.    low cost components for short-distance, low-bit-rate quantum key-distribution;

                                      ii.    high-bit rate QKD systems that are tolerant to noise and loss.

Projects have to demonstrate a net increase in performance, or reduction in energy or power consumption, compared to state-of-the-art approaches and have to validate the proposed technology in realistic application scenarios, taking into account the current trends in ICT like cloud, mobile, IoT, etc. Activities may include methods for provable security against physical attacks, as well as research toward security certification.

b.      Activities supporting the Cryptography Community

To complement the research activities in cryptography support and coordination actions should address the following aspects:

-       ensure a durable integration and structuring of the European cryptography community, involving academia, industry, law enforcement and defence agencies.

-       strengthen European excellence in this domain.

-       provide technology watch, joint research agendas and foresight studies.

-       identify technology gaps, market and implementation opportunities.

-       provide technical expertise to the cybersecurity and privacy communities.

-       contribute to the development of European standards, including for the public sector.

-       solve training needs and skill shortage of academia and industry.

-       evaluation and verification of cryptographic protocols and algorithms.

-       organize open competitions with security and implementation benchmarking.

-       dissemination and outreach, strengthening the link with institutional stakeholders.

Expected impact:

At macro level:

         a new paradigm for the design and implementation of ICT technology.

         ICT designed in Europe offering a higher level of security and/or privacy compared to non-European ICT products and services.

         ICT products and services compliant with Europe's security and privacy regulation.

         ICT with a measurably higher level of security and/or privacy, at marginal additional cost compared to ICT technology following the traditional designs (i.e. implementing security as add-on functionality).

At societal level:

         increase user trust in ICT and online services.

         improve users' ability to detect breaches of security and privacy.

         improved protection of the user's privacy, in compliance with applicable legislation.

         more resilient critical infrastructures and services.

At research and innovation level: a new generation of ICT systems, applications and services that

         empowers users to take control over their data and trust relations.

         provides security and privacy as a built-in feature, simpler to understand and manage for the user compared to traditional ICT.

         ICT solutions allowing the user to monitor if her/his rights-online are respected and in compliance with the EU regulation.

         simplify the implementation of cryptographic primitives.

         ICT technology that is proofed to be more secure than ICT designed the traditional way.

Instrument, funding level and budget

a.    Research & Innovation Actions – A mix of proposals requesting Small and Large contributions are expected

b.    Coordination and Support Actions


ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid. Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Los costes de personal subvencionables cubren las horas de trabajo efectivo de las personas directamente dedicadas a la ejecución de la acción. Los propietarios de pequeñas y medianas empresas que no perciban salario y otras personas físicas que no perciban salario podrán imputar los costes de personal sobre la base de una escala de costes unitarios
Purchase costs.
Los otros costes directos se dividen en los siguientes apartados: Viajes, amortizaciones, equipamiento y otros bienes y servicios. Se financia la amortización de equipos, permitiendo incluir la amortización de equipos adquiridos antes del proyecto si se registra durante su ejecución. En el apartado de otros bienes y servicios se incluyen los diferentes bienes y servicios comprados por los beneficiarios a proveedores externos para poder llevar a cabo sus tareas
Subcontracting costs.
La subcontratación en ayudas europeas no debe tratarse del core de actividades de I+D del proyecto. El contratista debe ser seleccionado por el beneficiario de acuerdo con el principio de mejor relación calidad-precio bajo las condiciones de transparencia e igualdad (en ningún caso consistirá en solicitar menos de 3 ofertas). En el caso de entidades públicas, para la subcontratación se deberán de seguir las leyes que rijan en el país al que pertenezca el contratante
Amortizaciones.
Activos.
Otros Gastos.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 5:. Los elementos básicos de la innovación son integrados de manera que la configuración final es similar a su aplicación final, es decir que está listo para ser usado en la simulación de un entorno real. Se mejoran los modelos tanto técnicos como económicos del diseño inicial, se ha identificado adicionalmente aspectos de seguridad, limitaciones ambiéntales y/o regulatorios entre otros. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Please read carefully all provisions below before the preparation of your application.
To see the budget earmarked for this topic, please look at the call budget distribution table by topic in the workprogramme.
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
 
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 3 months from the date of informing successful applicants.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Research and Innovation Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
Coordi...
Please read carefully all provisions below before the preparation of your application.
To see the budget earmarked for this topic, please look at the call budget distribution table by topic in the workprogramme.
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
 
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 3 months from the date of informing successful applicants.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Research and Innovation Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
Coordination and Support Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
 
Additional provisions:
Horizon 2020 budget flexibility
Classified information
 
Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
 
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda tiene efecto incentivador, por lo que el proyecto no puede haberse iniciado antes de la presentación de la solicitud de ayuda. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
H2020-ICT-2014 Cybersecurity, Trustworthy ICT Scope:Specific Challenge: The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new...
Sin info.
DT-ICT-12-2020 Boost rural economies through cross-sector digital service platforms
en consorcio:
Cerrada hace 9 meses | Próxima convocatoria prevista para el mes de
ICT-48-2020 Towards a vibrant European network of AI excellence centres
en consorcio:
Cerrada hace 11 meses | Próxima convocatoria prevista para el mes de
ICT-56-2020 Next Generation Internet of Things
en consorcio:
Cerrada hace 1 año | Próxima convocatoria prevista para el mes de
ICT-57-2020 An empowering, inclusive Next Generation Internet
en consorcio:
Cerrada hace 1 año | Próxima convocatoria prevista para el mes de
ICT-49-2020 Artificial Intelligence on demand platform
en consorcio:
Cerrada hace 1 año | Próxima convocatoria prevista para el mes de