Entity

Time filter

Source Type

Austria

Kung A.,TRIALOG
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

This paper points out the importance of architecture in designing a privacy-by-design system. It provides an overview on how architectures are designed, analysed and evaluated, through quality attributes, tactics and architecture patterns. It then specifies a straw man architecture design methodology for privacy. The resulting PEAR (Privacy Enhancing ARchitecture) methodology is then illustrated through an Intelligent Transport systems (ITS) example application. The integration of the resulting methodology in a Privacy-by-Design process is then explained. Suggestions for future work that will lead to an agreed engineering practice are finally provided. © 2014 Springer International Publishing Switzerland. Source


Grant
Agency: Cordis | Branch: FP7 | Program: CP | Phase: ICT-2009.6.1 | Award Amount: 3.91M | Year: 2010

The next generation of intelligent vehicular information and communication technology (ICT) applications for advanced traffic management, active vehicle safety, or the green electric car strongly depends on the availability of an ICT infrastructure combining both dependability and security attributes. Thus, future intelligent vehicles (i) have to provide an appropriate wireless access point to their onboard IT systems and in-vehicle applications, (ii) need itself in turn appropriate access to external information and applications, and (iii) have to execute multiple independent applications with different level of criticality concurrently in a trusted manner.\nTo meet these challenges, OVERSEE will realize an open vehicular IT platform that provides a protected standardized in-vehicle runtime environment and onboard access and communication point. Therefore, the main objectives of the OVERSEE platform will be IT security and dependability that means enforcing a strong level of isolation between independent applications and ensuring that vehicle functionality and safety cannot be harmed by any OVERSEE application.\nOVERSEE will first carry out a requirement analysis based on a security risk and dependability analysis. It will then specify the in-vehicle platform architecture based on the following key elements:\n- Efficient resource virtualization that meets the stringent real-time and security requirements,\n- Trusted access to security services protected by a vehicular hardware security module,\n- Flexible trusted dynamic administration of application deployment, and\n- Monitoring capabilities based on a trusted point of control and observations (PCO).\nOVERSEE will also specify and develop the capabilities that are needed to validate future open platform implementations. This will involve assurance approach, validation tools, and run-time building blocks. Finally, OVERSEE will realize at least two novel ICT applications to proof the feasibility of the approach.


Grant
Agency: Cordis | Branch: FP7 | Program: CP-FP | Phase: SEC-2011.2.2-2 | Award Amount: 4.26M | Year: 2012

SECRET addresses the protection of railway infrastructure against EM attacks. Railway infrastructure is an attractive target for EM attacks, because of its familiarity and ease of access, with extended economic and security consequences. Today, the European rail network is evolving to harmonize the management system. This is reflected by new integrated technologies, adequate procedures and centralization of command centres. The new technologies facilitate the implementation of a harmonized system and improve the network competitiveness. However, they are also highly vulnerable to EM attacks (HPM and EMP). Railway actors fear this growing EM vulnerability and have no knowledge on the extent and severity of consequences. The risk of EM attacks is also increasing due to the higher use of interoperable systems (command/control, information systems). The harmonization of the European railway network results in a harmonized EM vulnerability. Thus, a device to generate EM attacks will have the same impact anywhere in Europe, facilitating the implementation of simultaneous EM attacks. Meanwhile, with the proliferation of wireless systems, access to radiated emission equipment is radically democratized, which facilitates the manufacture of EM interference transmitters able to disturb the technologies used for management of the railway network. Objectives of SECRET are to: -identify the vulnerability points at different levels (from the electronic to the systemic vision) -identify EM attack scenarios and risk assessment (service degradation, potential accidents, economic impacts) - identify public equipment which can be used to generate EM attacks -develop protection rules to strengthen the infrastructure (at electronic, architecture and systemic levels) -develop EM attack detection devices and processes -develop resilient architecture able to adequately react in case of EM attack detection -extract recommendations to ensure resiliency and contribute to standards


Grant
Agency: Cordis | Branch: H2020 | Program: IA | Phase: ICT-15-2014 | Award Amount: 5.75M | Year: 2015

Inside todays vehicles ~4000 CAN-Bus signals/sec are processed in comparison to very few signals in smart phones and alike. This large amount of continuously gathered vehicle data represents major big data business potentials, not only for the automotive industry but in particular for cross-sectorial industries with interdisciplinary applications. With todays proprietary approaches focusing on bringing services into vehicles and the applied ignorance of customer privacy concerns, this major business potential is still locked because the automotive industry was not yet able to establish an open service ecosystem equivalent to the ones in the smart phone industry. The core intention of the AutoMat project is to innovate an open ecosystem for Vehicle Big Data, materializing in the form of a cross-border Vehicle Big Data Marketplace that leverages currently unused information gathered from connected vehicles. The interface to the marketplace is derived from a Common Vehicle Information Model that makes mined and anonymous vehicle data from various OEMs accessible to cross-sectorial service providers. With the huge amount of volatile data from vehicles, the AutoMat ecosystem heavily builds upon current trends in Big Data. Exemplary service scenarios, driven by service providers dedicated to generate concrete businesses from the AutoMat ecosystem, are developed in the context of meteorological data based hyper local and extended innovative enterprise service domains. By defining an open value chain, the proposed AutoMat ecosystem enables and stimulates parties from different sectors to focus on their core businesses and to excel collaboration with other partners. AutoMat therefore may serve as incubator for new business opportunities strengthening Europes position as provider of innovative cross-sectorial and cross-border Big Data services. The latter aspect is actively stimulated during the project by an Open Service Contest based upon the AutoMat Big Data ecosystem.


Grant
Agency: Cordis | Branch: FP7 | Program: CP | Phase: GC-ICT-2011.6.8 | Award Amount: 8.53M | Year: 2011

The sustainable integration of the electric vehicles requires an intelligent charging system for the real-time\nexchange of charge related data between FEVs and the grid in order to allow the management of:\n high-current fast-charging for large numbers of FEVs in a brand-independent way\n price-adaptive charging/reverse-charging at optimum price for the customer\n the real-time grid balancing according to spatial and temporal needs and capacities, influenced by the demand (FEVs) and the supply side (unpredictability of regenerative energies)\n competent remote load charging process control in order to prevent damages of FEV batteries.\nIt is the objective of e-DASH to develop those IC Technologies and processes that are needed to achieve the real-time integration of FEVs in the European Electricity Grid to enable an optimum electricity price to the customer and at the same time allows an effective load balancing in the grid.\nGreat emphasis is placed on the openness of the V2OEM Interface granting access to multiple players maintaining the customers choice.\ne-DASH is structured into 5 work packages, with:\n WP 100 addresses project administration and scientific coordination\n WP 200 defines relevant functionalities for the use case and covers all EV-related developments as to the over-the-plug and the over-the-air communication\n WP 300 addresses the development of the E-Mobility Broker and OEM Back-End\n WP 400 develops the Demand Clearing House and the respective FEV demand & supply management grid balancing system\n 500 covering cross-cutting items: legal aspects, dissemination and standardization, system validation & demonstration\ne-DASH will become crucial to future electric road transport by providing the necessary intelligent charging system, which is able to balance locally and temporarily in almost real-time the electricity demand of large numbers of FEVs (fast charging) and instable regenerative energy supply.

Discover hidden collaborations