Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1
General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing and Mobile Services Bridge towards H2020 activities, in particular societal challenges Projects closer to the market => Demonstration and validation of security & privacy R&D results 2
a) Security and privacy in cloud computing b) Security and privacy in mobile services c) Development, demonstration and innovation in cyber security d) Technologies and methodologies to support European trust and security policies e) EU-Australia cooperation on building user trust in broadband delivered services 3
Call open: 10 July 2012 Call close: 15 January 2013 a) Cloud computing and b) Mobile services IPs/STREPs c) Cyber security up to one IP d) Technologies and methodologies up to one CSA per bullet point e) EU-Australia cooperation - up to one STREP Indicative budget distribution 36,5 M - IP/STREP: EUR 33,5 million, of which a minimum of 40% allocated to IPs and 30% to STREPs and up to 3 million for point e) - CSA: up to EUR 3 million 4 Remember: The Workprogramme text is the official reference for the call
a) Security and privacy in cloud computing (IPs/STREPs) - Solutions to improve security components (e.g. identification, authentication and encryption) - ensure long-term privacy and security of data & application b) Security and privacy in mobile services (IPs/STREPs) - Improve efficiency, robustness and performance of the security solutions for mobile environments - Specificities of mobile - Give user control of security & privacy 5
c) Development, demonstration and innovation in cyber security - application of technologies -> increase the level of cyber security in Internet - development and demonstration of technologies methodologies and processes - prevent, detect, manage and react to cyber incidents in real-time - empower users handling security incidents Up to one IP 6
d) Technologies and methodologies to support European trust and security policies => Complement the upcoming European Strategy of Cyber Security Develop a cyber security research agenda Analyse innovation process in privacy and cyber security technologies Facilitate privacy and security by design practices Up to one CSA per point, up to 3M EU funding
Expected Impact a), b), c) and d) - Demonstration (deployment & implementation) of secure and privacy-preserving technical solutions - Take-up of research outcomes and wider adoption of ICT security solutions - Development and implementation of European strategies for internet security 8
e) EU-Australia cooperation on building user trust in broadband delivered services - Developing and demonstrating an integrated framework, providing assurance of appropriate levels of security and privacy, including the identification and authentication services - More oriented towards implementation and deploying R&D solutions in a real-life scenario, than doing research - Working across several jurisdictions Up to one STREP, up to 3M EU funding 9
e) EU-Australia cooperation on building user trust in broadband delivered services Additional eligibility criteria - At least one Australian participant - Balanced effort EU-Australia - Australian participation not funded by FP7 - Single submission / evaluation in Brussels Australian Contact Points - Martin Gallagher, Science Counsellor, AUS Mission to the EU (BXL) martin.gallagher@dfat.gov.au - Dr John Percival, Executive Director, National Security Science and Technology Centre Defence Science and Technology Organisation, john.percival@dsto.defence.gov.au 10
Call 10 Coordinator Rodrigo Mendes rodrigo.mendes@ec.europa.eu Other International cooperation - FP7-ICT-2013-EU-JAPAN coordinated call - Call open: 02 October 2012 - Call close: 29 November 2012 11
ICT call -10: Objective 2013.1.5 - Trustworthy ICT 09/10/2012-9:30-16:00 Brussels - Belgium Avenue de Beaulieu 25, B 1160 - Room S 0/1 12
International Cooperation FP7-ICT-2013-EU-JAPAN Call open: 02 October 2012 Call close: 29 November 2012 EUR 9 million total Objective 10.1 c) Cybersecurity for improved resilience against cyber threats - up to One STREP
c) Cybersecurity for improved resilience against cyber threats target outcome Research on cybersecurity for improved resilience against cyber threats (leak of information, denial of service, malware) Develop technologies and strategies for: improving and enhancing cybersecurity in heterogeneous networked, service and computing environments facilitate the early identification of cyber-attacks. 14
Cybersecurity Target Outcome Demonstrable and state-of-the-art prototype to improve and enhance cybersecurity against existing and emerging cyber threats in Europe and Japan. Potential research topics include: privacy protection, database security, secure software development, fundamental security technologies based on cryptographic methods and protocols for cloud security, smart-phone security and future network security. 15
Impact Established international critical mass to develop new approaches and instruments in the fight against emerging cyber threats. Reinforced policy coordination between the EU and Japan as well as other potential international partners. 16
FP7-ICT Calls Pre-proposal check form This form may be submitted at any time up to four weeks before the close of call, to the email address given in the "European Commission Contact Persons" listing on the call page. Only one pre-proposal check is offered per proposal. The Commission services will reply by electronic mail giving a brief assessment of this pre-proposal. The assessment does not constitute in any respect a pre-evaluation of the proposal in terms of scientific and technical quality. The advice given by the Commission is strictly informal and non-binding. The advice provided does not in any way engage the Commission with regard to acceptance or rejection of the proposal when it is finally submitted. 17
Thanks for your attention! Dr. Gustav Kalbe Deputy Head of Unit gustav.kalbe@ec.europa.eu Rodrigo Mendes Objective coordinator rodrigo.mendes@ec.europa.eu DG CONNECT H.4 Trust & Security Who is who: http://cordis.europa.eu/fp7/ict/security/contacts_en.html Call 10 page: http://ec.europa.eu/research/participants/portal/page/cooperation?callidentifier =FP7-ICT-2013-10 18