• English (UK)
  • Italiano (IT)
cerict
  • Home
  • CeRICT
    • About US
    • The Mission
    • Competences Area
    • Organizational Structure
      • Organizational Structure
    • Contacts
    • Benevento (Legal Head Office)
    • Benevento (Optoelectronics&Photonics Center)
    • Naples (Headquarters)
  • IEEE EVENTS
  • Partners
Search
  • Home
  • Progetti Europei in corso
  • Progetti CeRICT
  • Progetti Europei
  • Completed European Projects

MUSA

  • Print
  • Email

 

  • MUSA
  • Abstract
  • Partner

MUSA

 Project

MUSAmusa
Title MUlti-cloud Secure Applications Acronym MUSA
Project ID 644429 Call H2020-ICT-2014-1
Programme H2020    
Activity cloud security, multi-cloud, distributed application, heterogeneous cloud, security SLA, decision support, deployment, monitoring, enforcement, security assurance, DevOps, lifecycle management
 Links
  • http://www.tut.fi/musa-project
  • http://cordis.europa.eu/project/rcn/194208_en.html
  • http://www.musa-project.eu/

 

Abstract

Abstract
The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. The main objective of MUSA is to support the security-intelligent lifecycle management of distributed applications over heterogeneous cloud resources, through a security framework that includes: security-by-design mechanisms to allow application self-protection at runtime, and methods and tools for the integrated security assurance in both the engineering and operation of multi-cloud applications. The MUSA framework leverages security-by-design, agile and DevOps approaches in multi-cloud applications, and enables the security-aware development and operation of multi-cloud applications. The framework will be composed of a) an IDE for creating the multi-cloud application taking into account its security requirements together with functional and business requirements, b) a set of security mechanisms embedded in the multi-cloud application components for self-protection, c) an automated deployment environment that, based on an intelligent decision support system, will allow for the dynamic distribution of the components according to security needs, and d) a security assurance platform in form of a SaaS that will support multi-cloud application runtime security control and transparency to increase user trust. The project will demonstrate and evaluate the economic viability and practical usability of the MUSA framework in highly relevant industrial applications representative of multi-cloud application development potential in Europe. The project duration will be 36 months, with an overall budget of 3,574,190 euros.

Partner

Partner
  • FUNDACION TECNALIA RESEARCH & INNOVATION(999604110)-COORDINATOR
  • Centro Regionale Information Communication Technology scrl(986394262)-BENEFICIARY
  • CA TECHNOLOGIES DEVELOPMENT SPAIN SA(972159221)-BENEFICIARY
  • MONTIMAGE EURL(999716242)-BENEFICIARY
  • AIMES GRID SERVICES COMMUNITY INTEREST COMPANY(956000476)-BENEFICIARY
  • LUFTHANSA SYSTEMS AG(954831044)-BENEFICIARY
  • TTY-SAATIO(990343811)-BENEFICIARY

 

SPECS

  • Print
  • Email
  • SPECS
  • Abstract
  • Partner

SPECS

 Project

 SPECS

Title Secure Provisioning of Cloud Services based on SLA management Acronym SPECS
Project ID 610795 Call FP7-ICT-2013-10
Programme FP7 Rdg CNECT
Activity Trustworthy ICT 
Links
  • http://www.specs-project.eu/
  • http://cordis.europa.eu/project/rcn/110457_en.html

Abstract

Abstract
The Cloud offers attractive options to migrate corporate applications without the corporate security manager needing to manage or secure any physical resources. While this “ease” is appealing, several security issue arise: * Can the validity of corporate legal compliance regulations still be ensured over remote data storage? * With security sensitive data residing remotely with the Cloud Service Provider (CSP), can access of unauthorized CSP personnel to your data be restricted? * How does one assess a CSP’s ability to meet the corporate security requirements and the security trades-offs offered by different CSPs? * Can one monitor and enforce the agreed Cloud security levels with the CSP? No comprehensive and easily usable solutions exist for these issues. SPECS solves this problem, offering: * Mechanisms to specify Cloud security requirements and assess the standalone and comparative security features offered by CSPs. * Ability to integrate desired corporate security services (eg. credential and access management) into Cloud services. * Systematic approaches to negotiate, monitor and enforce the security parameters specified in Service Level Agreements (SLA). * Approaches to develop and deploy security services that are “Cloud SLA-aware”, implemented as an open-source Platform-as-a-Service (PaaS). Providing such comprehensible and enforceable security assurance by CSP’s is a critical factor to deploy trustworthy Cloud ecosystems. Targeting ICT-2013.1.5 “Trustworthy ICT”, SPECS will develop and implement an open source framework to offer Security-as-a-Service, by relying on the notion of security parameters specified in Service Level Agreements (SLA) and providing the techniques to systematically manage their life-cycle. The SPECS framework addresses both CSP’s and users to provide techniques and tools for: a) Enabling user-centric negotiation of security parameters in Cloud SLA, along with a trade-off evaluation process among users and CSPs, in order to compose Cloud services fulfilling a minimum required security level. b) Monitoring in real-time the fulfillment of SLAs agreed with CSPs, notifying both users and CSPs, when a SLAs not being fulfilled. c) Enforcing agreed SLA in order to keep a sustained Quality of Security (QoSec) that fulfills the specified security parameters. SPECS’ enforcement framework will also “react and adapt” in real-time to fluctuations in the QoSec by advising/applying the requisite countermeasures. The proposed framework will be based on an open-source core, and offer simple interfaces to motivate its adoption. It will offer a set of reusable PaaS components for service developers to enable them to integrate SPECS’ SLA-oriented security mechanisms into existing Cloud services. Using real case studies SPECS will demonstrate that the contributed framework and architecture can be integrated “as-a-Service” into real life Cloud environments, with a particular emphasis on small/medium/federated CSP and end users.

Partner

Partner
  • Centro Regionale Information Communication Technology scrl(986394262)-COORDINATOR
  • TECHNISCHE UNIVERSITAET DARMSTADT(999986581)-BENEFICIARY
  • INSTITUTUL E-AUSTRIA TIMISOARA(999624674)-BENEFICIARY
  • CLOUD SECURITY ALLIANCE (EUROPE) LBG(957576241)-BENEFICIARY
  • INSTITUTO CIENTIFICO DE INNOVACION Y TECNOLOGIAS APLICADAS DE NAVARRA(958454091)-BENEFICIARY
  • XLAB RAZVOJ PROGRAMSKE OPREME IN SVETOVANJE DOO(999773375)-BENEFICIARY
  • EMC INFORMATION SYSTEMS INTERNATIONAL(959978349)-BENEFICIARY

OPTObacteria

  • Print
  • Email
  • OPTObacteria
  • Abstract
  • Partner

OPTObacteria

 Project

 OPTObacteriaBACTERIA

Title Multianalyte automatic system for the detection of drug resistant bacteria. Acronym OPTObacteria
Project ID 286998 Call FP7-SME-2011
Programme FP7 Rdg REA
Activity  
 
Links
  • Project site    http://www.optobacteria.eu/default.aspx

  • Project details    http://cordis.europa.eu/project/rcn/105638_en.html

  • Final Report   http://www.cordis.europa.eu/result/rcn/165733_en.html

Abstract

Abstract
Infectious disease are responsible of high human health burden and cost. Time to diagnosis release and quality of the microrganism detection represent an area of interest for optical fiber based device application. OPTObacteria propose an highly expert consortium in which 4 SME and 4 research peformers from 3 European countries would synergize their efforts to provide a unique Automatic Laboratory Detector (ALD) to deliver a drug resistance report in a 4 or 4-8 hours timeframe. The time is depending on the experiment required, it avoid bacterial grwoth time, typical of the antibiogram typical report and provide an detection up to low ng concentration or even low. With respect to other optical-based device (like SPR, surface plamon resosnance) many limitations are overcome.

Partner

Partner
  • TYDOCK PHARMA S.r.l(990039813)-COORDINATOR
  • MOLECULAR DISCOVERY LTD(997468655)-BENEFICIARY
  • OPTOSMART SRL(991761466)-BENEFICIARY
  • UNIVERSITA DEGLI STUDI DI MODENA E REGGIO EMILIA(999840887)-BENEFICIARY
  • CONSIGLIO NAZIONALE DELLE RICERCHE(999979500)-BENEFICIARY
  • Centro Regionale Information Communication Technology scrl(986394262)-BENEFICIARY
  • AGENCIA ESTATAL CONSEJO SUPERIOR DE INVESTIGACIONES CIENTIFICAS(999991722)-BENEFICIARY
  • PROYECCION EUROPLAN XXI S.L.(953806142)-BENEFICIARY
  • FUNDACION PUBLICA ANDALUZA PARA LAGESTION DE LA INVESTIGACION EN SALUD DE SEVILLA(994159888)-BENEFICIARY

SCYPRI

  • Print
  • Email
  • SCYPRI
  • Abstract
  • Partner

SCYPRI

 Project

 SCYPRISCYPRI

Title SMART CYLINDERS FOR FLEXOGRAPHIC PRINTING INDUSTRY Acronym SCYPRI
Project ID 315335 Call FP7-SME-2012
Programme FP7 Rdg REA
Activity  
 
Links
  • Project site   http://www.scypri.eu/new/

  • Project details   http://www.cordis.europa.eu/project/rcn/105564_en.html

  • Final Report Summary   http://www.cordis.europa.eu/result/rcn/165721_en.html

Abstract

Abstract
The SCYPRI project proposes the design, implementation and validation of an innovative and smart plate cylinder to eliminate the Flexographic Printing Industry problems: Ø The first target will be to obtain, through the integration of a novel multifunction fiber optic sensing system within the carbon fibre body cylinder, the data of the running behavior and the anomalies of the cylinder which can communicate with an autonomous control system giving it the data needed to dynamically adjust in real time the driving parameters of the process. Ø The second target is related to the optimization of the carbon fibre cylinder: the composite lamination, due to the physical and geometrical characteristics of the composite tube (high thickness, considerable high modulus fibre quantity, high curing temperature) suffers of some limitation due to the need of avoiding noticeable composite thermal stresses. Ø The last target is to develop a simple, effective and user friendly connection system between the cylinder and the adapters, as explained before, to improve the stiffness characteristics of the system.

Partner

Partner
  • REGLASS SRL(953619126)-COORDINATOR
  • DICO ROMANIA SRL(953458785)-BENEFICIARY
  • PROYECCION EUROPLAN XXI S.L.(953806142)-BENEFICIARY
  • Centro Regionale Information Communication Technology scrl(986394262)-BENEFICIARY
  • CONSIGLIO NAZIONALE DELLE RICERCHE(999979500)-BENEFICIARY
  • UNIVERSITY OF BATH(999842924)-BENEFICIARY

Progetti Europei

  • Progetti Europei in corso
  • Current European Projects
  • Progetti Europei conclusi

Progetti Nazionali

  • Progetti Nazionali in corso
  • Progetti Nazionali conclusi

Progetti Locali

  • Progetti Regionali in corso
  • Progetti Regionali conclusi

Sede Legale Benevento

Sede BN

Sede Operativa Napoli

Sede NA


© 2025 cerict - Partita IVA 01346480625

  • Privacy
cerict
  • Home
  • CeRICT
    • About US
    • The Mission
    • Competences Area
    • Organizational Structure
      • Organizational Structure
    • Contacts
    • Benevento (Legal Head Office)
    • Benevento (Optoelectronics&Photonics Center)
    • Naples (Headquarters)
  • IEEE EVENTS
  • Partners
  • English (UK)
  • Italiano (IT)
Go Top

Search our website

  • Follow via Facebook
  • Follow via Youtube
  • Follow via LinkedIn