ICT-32-2014

Cybersecurity, Trustworthy ICT -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • ICT-10-2016
    Software Technologies

    MOTIVATION Both address research on security mechanisms in software development

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment
  • SU-ICT-02-2020
    Building blocks for resilience in evolving ICT systems

    MOTIVATION These two topics address many of the same problems, like security by design, although SU-ICT-02 is more detailed

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment
  • SU-ICT-04-2019
    Quantum Key Distribution testbed

    MOTIVATION Quantum Key Distribution

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment

Call text (as on F&T portal)

View on F&T portal

Scope

Specific Challenge:

The fast evolution of ICT technology together with the uses that are made of it are exponentially introducing new threats, vulnerabilities and risks. There is a growing consensus that the state-of-the-art approach to secure ICT is becoming obsolete and, in addition, the walled-garden concept for security is becoming invalid.

The challenge is to find solutions guaranteeing end-to-end security that withstands progress for the lifespan of the application it supports, regardless of improvements in attacker hardware or computational capabilities.

Scope:

a.      Research & Innovation Actions

         Security-by-design for end-to-end security

Security-by-design paradigms have to be developed and tested, to providing end-to-end security, across all hardware and software layers of an ICT system and application and business services. Special attention has to be paid to the interaction of the layers and to a holistic approach. Platform independent solutions are needed to provide context aware and self-adaptive security in highly connected, complex and interoperable networks.

Automated security policy governance for such environments has to be addressed, allowing for run-time verification, customisation and enforcement between operators or virtual entities, in multi-layer and multi-service systems, spanning multiple domains or jurisdictions.

Open and dynamically reconfigurable environments need special attention, as well as environments where the user or provider has to rely on other providers, not necessarily of trustworthy origin.

The developed security-by-design solutions are expected to be usable in their deployment and implementation in order to decrease the security risks associated with improper use or misconfiguration and thereby allowing the user to trust devices and services intuitively.

         Cryptography

Research projects have to address the key challenges to guarantee the security for the lifespan of the application it supports, to stay ahead of the evolution of the ICT environment and keep pace with the performance increase of ICT technology. The challenges to be addressed include:

-       Resource efficient and highly secure technology for hardware based real-time cryptography;

-       Resource efficient, real-time, highly secure fully homomorphic cryptography;

-       Distributed cryptography including functional cryptography;

-       Cryptographic tools for securely binding applications to software, firmware and hardware environments, with or without the possibility to adapt the cryptographic primitives which are used;

-       Post-quantum cryptography for long term security;

-       Quantum key distribution (QKD) systems and networks for long-term security by design, as well as networks supporting information theoretic cryptographic primitives, including but not restricted to the integration into existing optical networks (e.g. trusted nodes and/or using multiplexing), addressing:

                                        i.    low cost components for short-distance, low-bit-rate quantum key-distribution;

                                      ii.    high-bit rate QKD systems that are tolerant to noise and loss.

Projects have to demonstrate a net increase in performance, or reduction in energy or power consumption, compared to state-of-the-art approaches and have to validate the proposed technology in realistic application scenarios, taking into account the current trends in ICT like cloud, mobile, IoT, etc. Activities may include methods for provable security against physical attacks, as well as research toward security certification.

b.      Activities supporting the Cryptography Community

To complement the research activities in cryptography support and coordination actions should address the following aspects:

-       ensure a durable integration and structuring of the European cryptography community, involving academia, industry, law enforcement and defence agencies.

-       strengthen European excellence in this domain.

-       provide technology watch, joint research agendas and foresight studies.

-       identify technology gaps, market and implementation opportunities.

-       provide technical expertise to the cybersecurity and privacy communities.

-       contribute to the development of European standards, including for the public sector.

-       solve training needs and skill shortage of academia and industry.

-       evaluation and verification of cryptographic protocols and algorithms.

-       organize open competitions with security and implementation benchmarking.

-       dissemination and outreach, strengthening the link with institutional stakeholders.

Expected impact:

At macro level:

         a new paradigm for the design and implementation of ICT technology.

         ICT designed in Europe offering a higher level of security and/or privacy compared to non-European ICT products and services.

         ICT products and services compliant with Europe's security and privacy regulation.

         ICT with a measurably higher level of security and/or privacy, at marginal additional cost compared to ICT technology following the traditional designs (i.e. implementing security as add-on functionality).

At societal level:

         increase user trust in ICT and online services.

         improve users' ability to detect breaches of security and privacy.

         improved protection of the user's privacy, in compliance with applicable legislation.

         more resilient critical infrastructures and services.

At research and innovation level: a new generation of ICT systems, applications and services that

         empowers users to take control over their data and trust relations.

         provides security and privacy as a built-in feature, simpler to understand and manage for the user compared to traditional ICT.

         ICT solutions allowing the user to monitor if her/his rights-online are respected and in compliance with the EU regulation.

         simplify the implementation of cryptographic primitives.

         ICT technology that is proofed to be more secure than ICT designed the traditional way.

Instrument, funding level and budget

a.    Research & Innovation Actions – A mix of proposals requesting Small and Large contributions are expected

b.    Coordination and Support Actions

News flashes

2015-03-16

An overview of the evaluation results (Flash Call Info) is available under the tab "Call documents".

2014-12-04

A total of 83 proposals was submitted to this call. Please find here below the number of proposals per Type of Action:

- 70 Research and Innovation Actions (RIA)

- 8 Innovation Actions (IA)

- 5 Coordination and Support Actions (CSA).

2014-12-02

The submission session is now available for: ICT-14-2014(CSA-IA-RIA)

2014-09-23

An overview of the evaluation results (Flash Call Info) is now available here or under the tab 'Call documents'.

2014-09-23

A total of 1645 proposals were submitted in response to this call. The breakdown per topic is as follows:ICT-01-2014: 158ICT-02-2014: 106ICT-03-2014: 37ICT-05-2014: 37ICT-06-2014: 90ICT-07-2014: 157ICT-09-2014: 75ICT-11-2014: 30ICT-13-2014: 108ICT-15-2014: 106ICT-17-2014: 30ICT-18-2014: 85ICT-21-2014: 91ICT-22-2014: 108ICT-23-2014: 154ICT-26-2014: 101ICT-29-2014: 9ICT-31-2014: 48ICT-32-2014: 59ICT-33-2014: 1ICT-35-2014: 55

2014-05-15

The submission session is now available for: ICT-26-2014(ERA-NET-Cofund)

2014-02-07
The submission session is now available for: ICT-01-2014(RIA-IA), ICT-02-2014(RIA-IA), ICT-03-2014(RIA-IA), ICT-05-2014(RIA), ICT-06-2014(RIA), ICT-07-2014(RIA-IA), ICT-09-2014(RIA), ICT-11-2014(RIA-IA), ICT-13-2014(IA), ICT-15-2014(IA), ICT-17-2014(IA-RIA), ICT-18-2014(IA), ICT-21-2014(IA-RIA), ICT-22-2014(RIA-IA), ICT-23-2014(IA-RIA), ICT-26-2014(RIA-IA), ICT-29-2014(RIA), ICT-31-2014(RIA), ICT-32-2014(RIA), ICT-35-2014(IA)
2014-02-07
The submission session is now available for: ICT-01-2014(CSA), ICT-02-2014(CSA-COFUND-PCP), ICT-03-2014(COFUND-PCP), ICT-06-2014(CSA), ICT-07-2014(CSA), ICT-11-2014(CSA), ICT-13-2014(CSA), ICT-15-2014(CSA), ICT-17-2014(CSA), ICT-18-2014(CSA), ICT-23-2014(COFUND-PCP), ICT-26-2014(CSA), ICT-31-2014(CSA), ICT-32-2014(CSA), ICT-33-2014(CSA), ICT-35-2014(CSA)
2014-02-07
The submission session is now available for: ICT-02-2014(COFUND-PCP), ICT-03-2014(COFUND-PCP), ICT-23-2014(COFUND-PCP)
2013-12-23
The submission session is now available for: ICT-01-2014(RIA-CSA-IA), ICT-02-2014(RIA-IA-CSA), ICT-03-2014(IA-RIA), ICT-05-2014(RIA), ICT-06-2014(CSA-RIA), ICT-07-2014(RIA-IA-CSA), ICT-09-2014(RIA), ICT-11-2014(IA-CSA-RIA), ICT-13-2014(IA-CSA), ICT-15-2014(CSA-IA), ICT-17-2014(CSA-IA-RIA), ICT-18-2014(IA-CSA), ICT-21-2014(IA-RIA), ICT-22-2014(RIA-IA), ICT-23-2014(IA-RIA), ICT-26-2014(RIA-IA-CSA), ICT-29-2014(RIA), ICT-31-2014(RIA-CSA), ICT-32-2014(RIA-CSA), ICT-33-2014(CSA), ICT-35-2014(IA-CSA)
call topic details
Call status: Closed
Publication date: 2013-12-11 (11 years ago)
Opening date: 2013-12-11 (11 years ago)
Closing date: 2014-04-23 (11 years ago)
Procedure: single-stage

Budget: 649500000
Expected grants: not specified
News flashes

This call topic has been appended 10 times by the EC with news.

  • 2015-03-16
    an overview of the evaluation results (f...
  • 2014-12-04
    a total of 83 proposals was submitted to...
  • 2014-12-02
    the submission session is now available...
  • 2014-09-23
    an overview of the evaluation results (f...
  • 2014-09-23
    a total of 1645 proposals were submitted...
  • 2014-05-15
    the submission session is now available...
  • 2014-02-07
    the submission session is now available...
  • 2014-02-07
    the submission session is now available...
  • 2014-02-07
    the submission session is now available...
  • 2013-12-23
    the submission session is now available...
Call

H2020-ICT-2014

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 21 other topics in this call:

Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2024-03-30_14-22-47

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 11 years ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 11 years ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 11 years ago

    The call opened for submissions.

  4. Closing date

    - 11 years ago

    Deadline for submitting a project.

  5. Time to inform applicants Estimate

    - 10 years ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  6. Sign grant agreement Estimate

    - 10 years ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)