WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 6 | 7 || 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 8 ] --

For more details concerning these topics consult the ICT Work programme.

–  –  –

Focus of the ICT Theme Objective ICT-SEC-2007.1.7 The first focus is called for by the ICT theme21 and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available information infrastructures that link critical infrastructures so that they survive malicious attacks or accidental failures, guarantee integrity of data and continuous provision of responsive and

trustworthy services, and support dynamically varying trust requirements. This includes:

a) Understanding and managing the interactions and complexity of interdependent critical infrastructures; mastering their vulnerabilities; preventing against cascading effects;

providing recovery and continuity in critical scenarios (including research towards designing and building self adapted and self healing complex systems); and security and dependability metrics and assurance methods for quantifying infrastructure interdependencies.

b) Designing and developing secure and resilient networked and distributed information and process control systems; systemic risk analysis and security configuration and management of critical information infrastructures and dynamic assurance frameworks for interconnecting them with critical infrastructures; availability of security forensics.

c) Developing longer term visions and research roadmaps; metrics and benchmarks for comparative evaluation in support of certification and standardisation; international cooperation and co-ordination with developed countries; coordination with related national or regional programmes or initiatives.

Call: Joint Call ICT & Security 1 Funding schemes: (a) and (b) Collaborative Projects ('small or medium scale focused research projects' only); (c) Coordination and support actions (aiming at coordinating or at supporting research activities).

Focus of the Security Theme

The second focus is called for by the Security theme and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available transport and energy infrastructures that survive malicious attacks or accidental failures and

guaranteeing continuous provision of services. The following topics are called:

Topic ICT-SEC-2007-1.0-01 Risk assessment and contingency planning for interconnected transport or energy networks Technical content / scope: The task is to develop integrated frameworks and agreed, common methodologies for (a) global analyses and assessment of risks, failures and vulnerabilities of transport or energy infrastructures, and (b) management and contingency For more details concerning these topics consult the ICT Work Programme.

–  –  –

planning based on the compilation and analyses of emergency plans, to assure interoperability between interconnected and interdependent heterogeneous transport or energy infrastructures.

Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).

Topic ICT-SEC-2007-1.0-02 Modelling and simulation for training

Technical content / scope: Security crises concerning cross-border interconnected European transport or energy infrastructures can lead to effects with high impacts of disruption. The task consists of modelling & simulation including scenario building for handling security incidents to support the training of crisis managers.22 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Topic ICT-SEC-2007-1.0-03 Optimised situational awareness through intelligent surveillance of interconnected transport or energy infrastructures Technical content / scope: The task consists of developing tools that integrate smart surveillance information from interconnected and heterogeneous transport or energy infrastructures in order to build up high level situation awareness. The objective is to enable optimized decision making required for cross-border interoperable crisis management to ensure secure, resilient and always available transport or energy infrastructures.23 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Topic ICT-SEC-2007-1.0-04 ICT support for first responders in crises occurring in critical infrastructures Technical content / scope: The task consists of developing novel technologies for personal digital support systems as part of an integral, secure emergency management system to support first responders in crises occurring in various types of critical infrastructures under all circumstances. The action has to build upon ongoing research on emergency management, secure wireless communication, first responder technologies, etc. See as well topic SEC-2007Personal equipment with a view to compatibility and complementarity.

Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Expected impact:

Actions in this area will provide significant improvement in the security, performance, dependability and resilience of complex and interdependent critical infrastructures while considering as well organisational dynamics, human factors, societal issues and related legal aspects.





See also COM(2005) 576 final. Green Paper on a European Programme for Critical Infrastructure Protection.

Same as previous footnote.

–  –  –

They will reinforce European industry’s potential to create important market opportunities and establish leadership.

They will contribute to establishing, strengthening and preserving trust in the use of technologies for the protection of critical infrastructures. This includes creating sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g.

regarding potential classification requirements, international co-operation needs, communication and implementation strategies etc.), in order to ensure acceptance of such technologies by relevant stakeholders.

They will achieve a more effective protection through enhanced co-operation, coordination and focus across Europe, and contribute to the development and promotion of metrics, standards, evaluation and certification methods and best practice in security of critical infrastructures.

–  –  –

The total funding is shown, together with the breakdown of how this is financed through the annual budgets.

Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority

–  –  –

Indicative budget allocation for the Security Work Programme 2007 Security Research Call 1 (FP7-SEC-2007-1) Up to an indicative 3% for international co-operation.

Up to an indicative 2% for ERA-NET.

An indicative 58% (deviation possible from 50% to 70%) for integration projects (Areas 1.2, 2.2, 3.2, 4.2).

An indicative 35% (deviation possible from 25% to 45%) for capability projects (Areas 1.3, 2.3, 3.3, 4.3, in activity 6).

An indicative 7% (deviation possible from 4% to 12%) for topics which are implemented through coordination and supporting activities (Areas 1.1, 2.1, 3.1, 4.1, in activity 6, activity 7).

Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) Up to an indicative 3% for international co-operation.

An indicative 90% (deviation possible from 80% to 100%) for collaborative projects.

Up to an indicative 10% for coordination and support actions.

–  –  –

III IMPLEMENTATION OF CALLS

III.1 Security Research Call 1 (FP7-SEC-2007-1)

• Call title: Security Research Call 1

• Call identifier: FP7-SEC-2007-1

• Date of publication: 22 December 2006

• Deadline: 31 May 2007, at 17.00 h Brussels local time

• Revised indicative budget27: 156,5 M€

–  –  –

This amount includes 76,2M€ from the 2008 budget, which is added under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budget authority.

–  –  –

• Evaluation procedure:

A one-stage submission procedure will be followed.

Proposals will be evaluated in a single-step procedure.

• Indicative evaluation and contractual timetable: Evaluations of proposals are expected to be carried out in June/July 2007. It is expected that the contract negotiations for the shortlisted proposals will be open from September 2007 to July 2008.

• Consortia agreements are required for all actions.

• Particular requirements for participation, evaluation and implementation:

The minimum number of participating entities required, for all funding schemes, is set out in the Rules for Participation: For Collaborative projects, the minimum condition shall be the participation of 3 legal entities, each of which is established in a Member State or Associated Country and no two of which are established in the same Member State or Associated Country. For Coordination and Supporting Actions aiming at supporting research activities and policies the minimum condition shall be the participation of one legal entity. For Coordination and Supporting Actions aiming at coordinating research activities and policies the minimum condition shall be the participation of three legal entities, each of which is established in a Member State or Associated Country, and no two of which are established in the same Member State or Associated Country.

Proposals must not contain any classified information, this will immediately lead to declaring them ineligible (note that the proposed action itself can involve classified information).

If classified inputs are required to carry out a proposed action or the output of the action needs to be classified, proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.

Proposers claiming that their proposal should receive Community funding up to 75% should demonstrate in the proposal that the required conditions (very limited market size and a risk of "market failure", the need for accelerated equipment development in response to new threats) apply. The final decision will be based on the recommendations of the relevant evaluation panel.

Consortia are strongly encouraged to actively involve SMEs and end users. Their presence in the consortia will be judged under the evaluation criterion ‘Quality and efficiency of the implementation and the management’ with a view to meeting the main objectives of the theme.

Proposers responding to SEC-2007-7.0-06 must be NCPs officially appointed by the relevant national authorities, all others will be considered non eligible.

The evaluation panel will comprise end users as well.

Page 47 of 53 FP 7 Cooperation Work Programme: Security

The evaluation criteria (including weights and thresholds) and sub-criteria, together with the eligibility, selection and award criteria for the different funding schemes are set out in Annex 2 to this work programme.

Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.

Coordinators of all integration project proposals and of all demonstration project (phase 1) proposals that pass all the evaluation thresholds can be invited to a hearing.

As a result of the evaluation, a ranked list of proposals retained for funding will be drawn up as well as a reserve list of proposals that may be funded in case budget becomes available during negotiations.

The forms of grants which will be offered are specified in Annex 3 to the Co-operation work programme

–  –  –

III.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1)

• Call title: Joint Call ICT & Security 1

• Call identifier: FP7-ICT-SEC-2007-1

• Date of publication 28: 30 August 2007

• Deadline29: 29 November 2007, at 17.00 h Brussels local time Indicative budget: The indicative call budget is foreseen to be 40 M€, provided by the Security theme (20 M€)30 for actions addressing the specific focus 2 and by the ICT theme (20 M€)31 for actions addressing the specific focus 1. Out of the Security theme's budget (20 M€), an indicative 1 M€ is available for international co-operation.

–  –  –

The Director-general responsible for the call may publish it up to one month prior to or after the envisaged date of publication At the time of the publication of the call, the Director-general responsible may delay this deadline by up to two months.

An amount of 20 M€ is given by the Security theme from the 2008 budget, under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budget authority.

An amount of 20 M€ is given by the ICT theme from the 2008 budget, under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budget authority.

–  –  –

• Evaluation procedure:

A one-stage submission procedure will be followed.

Proposals will be evaluated in a single-step procedure.

• Indicative evaluation and contractual timetable: Evaluations of proposals are expected to be carried out during the month of January 2008. It is expected that the contract negotiations for the shortlisted proposals will be open from March to July 2008.



Pages:     | 1 |   ...   | 6 | 7 || 9 |


Similar works:

«Experiential Learning Theory Bibliography Volume 1 1971-2005 Prepared by Alice Kolb & David Kolb The bibliography contains references on experiential learning theory from 1971The updated list has 2363 entries. The bibliography gives a complete listing by author. The bibliography is in PDF and formatted in APA style. Many research studies listed in the bibliography can be accessed through research databases such as: Social Science Citation Index, MEDLINE, Education Abstract, Dissertation...»

«How to Eat to Live Book 1 There is no way for us to learn the right way to eat in order to live a long life, except through the guidance and teachings of Allah, Who came in the person of Master Fard Muhammad. The Honorable Elijah Muhammad, How to Eat to Live.Book one Chapter 1 Right Way to Eat Chapter 2 Vegetables Chapter 3 Food God Suggests Chapter 4 Why They Urge You to Eat the Swine Chapter 5 The Pig.Swine Chapter 6 Fasting Chapter 7 One Meal A Day Chapter 8 Beware of Starchy Foods and...»

«PL 31.10.2013 Dziennik Urzędowy Unii Europejskiej C 317 E / 1 IV (Informacje) INFORMACJE INSTYTUCJI, ORGANÓW I JEDNOSTEK ORGANIZACYJNYCH UNII EUROPEJSKIEJ PARLAMENT EUROPEJSKI PYTANIA PISEMNE Z ODPOWIEDZIĄ Pytania pisemne skierowane przez posłów do Parlamentu Europejskiego i odpowiedzi na te pytania udzielone przez instytucję Unii Europejskiej (2013/C 317 E/01) Treść Strona E-010590/12 by Hans-Peter Martin to the Commission Subject: International rules on the use of drones   Deutsche...»

«MÚSICA Y AUDIOVISUALES Consejos y guía de buenas prácticas Por Ainara LeGardon www.ainaralegardon.com Texto publicado en enero del 2016 bajo una licencia CC BY-NC-SA 3.0: Se puede difundir, estudiar y modificar libremente, siempre que se acredite a la autora, no exista ánimo de lucro y las obras derivadas se redistribuyan con la misma licencia que la obra original. ÍNDICE págINA Introducción ¿Qué es una sincronización? Como autor, ¿cómo puedo valorar mi decisión de autorizar o no...»

«LEGISLATIVE COUNCIL General Purpose Standing Committee No. 2 The management and operations of the Ambulance Service of NSW Ordered to be printed 20 October 2008 according to Standing Order 231 Report 27 October 2008 LEGISLATIVE COUNCIL The management and operations of the Ambulance Service of New South Wales New South Wales Parliamentary Library cataloguing-in-publication data: New South Wales. Parliament. Legislative Council. General Purpose Standing Committee No. The management and operations...»

«Explaining contact hours Guidance for institutions providing public information about higher education in the UK August 2011 © The Quality Assurance Agency for Higher Education 2011 ISBN 978 1 84979 346 9 All QAA’s publications are available on our website www.qaa.ac.uk Registered charity numbers 1062746 and SC037786 Contents Preface 1 1 Introduction 2 Who is this guidance for? 3 How is this guidance intended to be used? 3 How is this document structured? 3 2 What is meant by 'contact...»

«EL MERCOSUR Y LAS UNIONES MONETARIAS Lic. Miguel H. Lliteras Lic. Claudia P. Legnini Universidad Nacional del Sur RESUMEN La reciente concreción de la Unión Monetaria Europea, acelera el análisis de factibilidad de ese arreglo institucional en otras regiones. La teoría de las Areas Monetarias Optimas brinda una referencia analítica básica sobre las cuestiones que hacen que una zona sea apta para convertirse en una Unión Monetaria. Este trabajo analiza estas cuestiones, tratando de...»

«Documentos De trabajo Precio del petróleo: tensiones geopolíticas y eventos de oferta eduardo López ercio muñoz N.º 680 Noviembre 2012 BANCO CENTRAL DE CHILE Documentos De trabajo Precio del petróleo: tensiones geopolíticas y eventos de oferta eduardo López ercio muñoz N.º 680 Noviembre 2012 BANCO CENTRAL DE CHILE BANCO CENTRAL DE CHILE CENTRAL BANK OF CHILE La serie Documentos de Trabajo es una publicación del Banco Central de Chile que divulga los trabajos de investigación...»

«Is there another cantata cycle by Gottfried Heinrich Stölzel that belonged to Bach’s performance repertoire? by Andreas Glöckner (Leipzig) [from the Bach-Jahrbuch 2009] Recently [in the Bach-Jahrbuch 2008, pp. 99-158] Marc-Roderich Pfau and Peter Wollny were able to document by the existence of two, previously unknown cantata text booklets Bach’s performances of eight cantatas in the main churches, St. Nikolai and St. Thomas, in Leipzig from the 13th through the 19th Sundays after Trinity...»

«Bibliografía ABOITES, H., Viento del norte. TLC y privatización de la educación superior en México, 2a. ed., UAM, Plaza y Valdés, México, 1999. ACOSTA, A., Estado, políticas y universidades en un periodo de transición, 1982-1994, tesis de doctorado, Flacso, México, 1997. ACOSTA SILVA, Adrián, “Cambios en la transición. Análisis de tres procesos de reforma universitaria en México”, en Sociológica 13 (36), UAM, México, 1998. AGUILERA MEJÍA, María de la Luz, “Análisis de la...»

«Running head: CATHOLIC AND ELCA ECUMENISM DeRosch 1 Ecumenism: Catholicism and the ELCA The possibility of ecumenism between the Catholic Church and the Evangelical Lutheran Church of America An Honors Capstone Submitted in Partial Fulfillment of the Requirements for Graduation with University Honors By: Trevor De Rosch Committee Chair: Kirk Van Gilder, Ph.D. Second Reader: Jeffrey Brune, Ph.D. Additional Reader: Roberto Sanchez, Ph.D. Honors Director: Dr. Shirley Shultz Myers, Ph.D. Honors...»

«Thirteen Cents by K. Sello Duiker: Exposing Street Child Reality in South Africa by Mamadou Abdou Babou Ngom, Ph.D. mamadouabdoubabou@hotmail.com Researcher in African Anglophone Literature Gaston Berger University, Faculty of the Humanities Saint Louis, Senegal Abstract This research paper aims at carrying out an in-depth analysis of the street kid phenomenon in the new South Africa. Even though no country worldwide is spared by the unsightly spectacle of grungy children in rags roaming the...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.