HORIZON-JU-SNS-2022-STREAM-A-01-06

Trustworthy and Reliable End-to-end connectivity Software platforms -

About the connections

The graph above was generated based on the following links

Call text (as on F&T portal)

View on F&T portal

Expected Outcome

  • Novel technologies/methods for ensuring Trust and Reliability, evolving 5G, in a very distributed multi-stakeholder context, extending the concept of edges from small CPEs and IoT devices to regional datacentres, enabling full control over end-to-endend-to-end data flows and trust on the execution environments.
  • Further evolving security of 5G towards the notion of building and maintaining Trust in deployed and interconnected 5G systems and services.
  • An open, flexible architecture, for evolved 5G, able to cope with widely distributed, federated, and dynamic systems for data processing, data storage and communication tackling data reliability challenges.
  • The outcome should build trust and reliability, significantly advanced beyond the baseline security measures of 5G.

Objective

Please refer to the "Specific Challenges and Objectives" section for Stream A in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.

Scope

The work addresses the reliability/trust challenges created by fully virtualized solutions, increased network programmability, extended network exposure and tight integration to service providers and non-public networks spanning the business actors of the value-chain. It includes:

  • Secure and reliable technologies for efficient containers and smart and secure container orchestration, with reliable software virtualization, with fast instantiations and mobility support seen as promising primitives for supporting these novel security architectures, and subsequently be transferred to standardization bodies.
  • Support of flexible security policies in very distributed (and continuously changing) settings complementing traditional perimeter protection technologies.
  • Holistic approaches to reliability, spanning the lifecycle of smart networks and services.
  • Novel requirements from challenging verticals, jointly using secure software engineering and operational procedures to manage risks across multiple stakeholders including quantification of security attributes and communication of associated risk for stakeholders.
  • Better tools for initial ‘security by design’ and for creation of “safer” code, collaborative methods, and run-time tools to manage risks, and measures to cope with new developments in areas such as AI.
  • Virtualisation of security functions (Protection, detection, remediation) and Exposure and integration of security services (MSSP, NOC-SOC interactions).
  • Enablement of service and infrastructure providers (including end-users) to enter into agreements with infrastructure maintainers, based on the capabilities of the SBA-architectures, to provide storage and/or communication of data without the need for all parties to trust each other.
  • Adherence with and improvements of efficient data sovereignty strategies in different domains (including bridging public and private networks) by enabling secure applications in different vertical domains should be demonstrated notably through measurable/observable outputs in terms of trust in networked components and subsystems.
  • The definition of a security verification policy and associated credentialing of the secure communication system capability via the development and testing in accordance with processes that allow guaranteeing the required level of security in a way that is accepted by all service providers and system developers, especially with respect to the notion of trust.

News flashes

2022-02-03

Please note that the funding rates in this topic are: 100% for non-for-profit organizations and 90% with respect to for-profit organizations. Unfortunately, the maximum funding rate in the budget table is set to 100%. We kindly ask all for-profit organizations to make a manual calculation and request only 90% of the budget.

2022-01-31
The submission session is now available for: HORIZON-JU-SNS-2022-STREAM-A-01-02(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-A-01-05(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-A-01-07(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-B-01-02(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-B-01-04(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-C-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-D-01-01(HORIZON-JU-IA), HORIZON-JU-SNS-2022-STREAM-CSA-02(HORIZON-JU-CSA), HORIZON-JU-SNS-2022-STREAM-A-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-A-01-04(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-A-01-06(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-B-01-01(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-B-01-03(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-A-01-03(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-B-01-05(HORIZON-JU-RIA), HORIZON-JU-SNS-2022-STREAM-CSA-01(HORIZON-JU-CSA)
call topic details
Call status: Closed
Opening date: 2022-01-18 (4 years ago)
Closing date: 2022-04-26 (3 years ago)
Procedure: single-stage

Budget: 6,000,000
Expected grants: 1
Contribution: 6,000,000 - 6,000,000
News flashes

This call topic has been appended 2 times by the EC with news.

  • 2022-02-03
    please note that the funding rates in th...
  • 2022-01-31
    the submission session is now available...
Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2024-03-30_14-18-37

Annotations

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 4 years ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Opening date

    - 4 years ago

    The call opened for submissions.

  3. Closing date

    - 3 years ago

    Deadline for submitting a project.

  4. Time to inform applicants Estimate

    - 3 years ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  5. Sign grant agreement Estimate

    - 3 years ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  6. Publication date

    - 1 year ago

    The call was first imported in TopicTree.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)

Bubbles

This call topic is part of:

Call document info

This section will come soon and contain the scraped information from the call document, such as the expected impact, scope, and other relevant sections. In the meantime, you can find this information in the call text section or directly on the F&T portal. View on F&T portal