WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 6 | 7 || 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»

-- [ Page 8 ] --

Activity 1: Security systems integration, interconnectivity and interoperability For each of the four mission areas, integration, connectivity and interoperability play a very specific enabling role - both within and amongst missions. The purpose of this section is to draw attention to, and in some instances expand upon, those common issues of importance mentioned within the mission areas. Activities will enable and/or contribute to the performance of technology required for building up the necessary capabilities, thus focusing on cross-cutting issues such as: enhancing the interoperability and intercommunication of systems, equipment, services and processes while ensuring their reliability, protection of confidentiality and integrity of information, traceability of all transactions and their processing etc. Activities will also address standardisation and training matters (including such with respect to cultural, human and organisational interoperability).

To reach these objectives, a joint call with the ICT Theme is organised as follows:

Joint Call between the ICT Theme and the Security Theme on Critical Infrastructure Protection The interoperability and interconnectivity of supply systems is one of the cornerstones of the functioning of our societies. The vulnerabilities in the intercommunication of systems, equipment, services and processes and their resilience against malicious attacks of terrorism and (organised) crime are elementary to the security of the citizens.

The objective of the joint call is to make key infrastructures of modern life, such as energy production sites and transmission systems, storage and distribution, information and communication networks, sensitive manufacturing plants, banking and finance, healthcare, or transportation systems more secure and dependable. The aim is to protect such critical infrastructures that can be damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, negligence, mismanagements, accidents, computer hacking, criminal activity and malicious behaviour and to safeguard them against incidents, malfunctions and failures.

The joint call is structured around two specific foci.

For more details concerning these topics consult the ICT Work programme.

–  –  –

Focus of the ICT Theme Objective ICT-SEC-2007.1.7 The first focus is called for by the ICT theme21 and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available information infrastructures that link critical infrastructures so that they survive malicious attacks or accidental failures, guarantee integrity of data and continuous provision of responsive and

trustworthy services, and support dynamically varying trust requirements. This includes:

a) Understanding and managing the interactions and complexity of interdependent critical infrastructures; mastering their vulnerabilities; preventing against cascading effects;

providing recovery and continuity in critical scenarios (including research towards designing and building self adapted and self healing complex systems); and security and dependability metrics and assurance methods for quantifying infrastructure interdependencies.

b) Designing and developing secure and resilient networked and distributed information and process control systems; systemic risk analysis and security configuration and management of critical information infrastructures and dynamic assurance frameworks for interconnecting them with critical infrastructures; availability of security forensics.

c) Developing longer term visions and research roadmaps; metrics and benchmarks for comparative evaluation in support of certification and standardisation; international cooperation and co-ordination with developed countries; coordination with related national or regional programmes or initiatives.

Call: Joint Call ICT & Security 1 Funding schemes: (a) and (b) Collaborative Projects ('small or medium scale focused research projects' only); (c) Coordination and support actions (aiming at coordinating or at supporting research activities).

Focus of the Security Theme

The second focus is called for by the Security theme and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available transport and energy infrastructures that survive malicious attacks or accidental failures and

guaranteeing continuous provision of services. The following topics are called:

Topic ICT-SEC-2007-1.0-01 Risk assessment and contingency planning for interconnected transport or energy networks Technical content / scope: The task is to develop integrated frameworks and agreed, common methodologies for (a) global analyses and assessment of risks, failures and vulnerabilities of transport or energy infrastructures, and (b) management and contingency For more details concerning these topics consult the ICT Work Programme.

–  –  –

planning based on the compilation and analyses of emergency plans, to assure interoperability between interconnected and interdependent heterogeneous transport or energy infrastructures.

Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).





Topic ICT-SEC-2007-1.0-02 Modelling and simulation for training

Technical content / scope: Security crises concerning cross-border interconnected European transport or energy infrastructures can lead to effects with high impacts of disruption. The task consists of modelling & simulation including scenario building for handling security incidents to support the training of crisis managers.22 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Topic ICT-SEC-2007-1.0-03 Optimised situational awareness through intelligent surveillance of interconnected transport or energy infrastructures Technical content / scope: The task consists of developing tools that integrate smart surveillance information from interconnected and heterogeneous transport or energy infrastructures in order to build up high level situation awareness. The objective is to enable optimized decision making required for cross-border interoperable crisis management to ensure secure, resilient and always available transport or energy infrastructures.23 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Topic ICT-SEC-2007-1.0-04 ICT support for first responders in crises occurring in critical infrastructures Technical content / scope: The task consists of developing novel technologies for personal digital support systems as part of an integral, secure emergency management system to support first responders in crises occurring in various types of critical infrastructures under all circumstances. The action has to build upon ongoing research on emergency management, secure wireless communication, first responder technologies, etc. See as well topic SEC-2007Personal equipment with a view to compatibility and complementarity.

Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.

Expected impact:

Actions in this area will provide significant improvement in the security, performance, dependability and resilience of complex and interdependent critical infrastructures while considering as well organisational dynamics, human factors, societal issues and related legal aspects.

See also COM(2005) 576 final. Green Paper on a European Programme for Critical Infrastructure Protection.

Same as previous footnote.

–  –  –

They will reinforce European industry’s potential to create important market opportunities and establish leadership.

They will contribute to establishing, strengthening and preserving trust in the use of technologies for the protection of critical infrastructures. This includes creating sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g.

regarding potential classification requirements, international co-operation needs, communication and implementation strategies etc.), in order to ensure acceptance of such technologies by relevant stakeholders.

They will achieve a more effective protection through enhanced co-operation, coordination and focus across Europe, and contribute to the development and promotion of metrics, standards, evaluation and certification methods and best practice in security of critical infrastructures.

–  –  –

Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority

–  –  –

Indicative budget allocation for the Security Work Programme 2007 Security Research Call 1 (FP7-SEC-2007-1) Up to an indicative 3% for international co-operation.

Up to an indicative 2% for ERA-NET.

An indicative 58% (deviation possible from 50% to 70%) for integration projects (Areas 1.2, 2.2, 3.2, 4.2).

An indicative 35% (deviation possible from 25% to 45%) for capability projects (Areas 1.3, 2.3, 3.3, 4.3, in activity 6).

An indicative 7% (deviation possible from 4% to 12%) for topics which are implemented through coordination and supporting activities (Areas 1.1, 2.1, 3.1, 4.1, in activity 6, activity 7).

Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) Up to an indicative 3% for international co-operation.

An indicative 90% (deviation possible from 80% to 100%) for collaborative projects.

Up to an indicative 10% for coordination and support actions.

–  –  –

This amount includes EUR 76.2 million from the 2008 budget, which is added under the condition that the budget for 2008 is adopted without modifications by the budget authority.

–  –  –

• Evaluation procedure:

A one-stage submission procedure will be followed.

Proposals will be evaluated in a single-step procedure.

• Indicative evaluation and contractual timetable: Evaluations of proposals are expected to be carried out in June/July 2007. It is expected that the contract negotiations for the shortlisted proposals will be open from September 2007 to July 2008.

• Consortia agreements are required for all actions.

• Particular requirements for participation, evaluation and implementation:

The minimum number of participating entities required, for all funding schemes, is set out in the Rules for Participation: For Collaborative projects, the minimum condition shall be the participation of 3 legal entities, each of which is established in a Member State or Associated Country and no two of which are established in the same Member State or Associated Country. For Coordination and Supporting Actions aiming at supporting research activities and policies the minimum condition shall be the participation of one legal entity. For Coordination and Supporting Actions aiming at coordinating research activities and policies the minimum condition shall be the participation of three legal entities, each of which is established in a Member State or Associated Country, and no two of which are established in the same Member State or Associated Country.

Proposals must not contain any classified information, this will immediately lead to declaring them ineligible (note that the proposed action itself can involve classified information).

If classified inputs are required to carry out a proposed action or the output of the action needs to be classified, proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.

Proposers claiming that their proposal should receive Community funding up to 75% should demonstrate in the proposal that the required conditions (very limited market size and a risk of "market failure", the need for accelerated equipment development in response to new threats) apply. The final decision will be based on the recommendations of the relevant evaluation panel.

Consortia are strongly encouraged to actively involve SMEs and end users. Their presence in the consortia will be judged under the evaluation criterion ‘Quality and efficiency of the implementation and the management’ with a view to meeting the main objectives of the theme.

Proposers responding to SEC-2007-7.0-06 must be NCPs officially appointed by the relevant national authorities, all others will be considered non eligible.

The evaluation panel will comprise end users as well.

Page 50 of 57 FP 7 Cooperation Work Programme: Security

The evaluation criteria (including weights and thresholds) and sub-criteria, together with the eligibility, selection and award criteria for the different funding schemes are set out in Annex 2 to this work programme.

Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.

Coordinators of all integration project proposals and of all demonstration project (phase 1) proposals that pass all the evaluation thresholds can be invited to a hearing.

As a result of the evaluation, a ranked list of proposals retained for funding will be drawn up as well as a reserve list of proposals that may be funded in case budget becomes available during negotiations.

The forms of grants which will be offered are specified in Annex 3 to the Co-operation work programme

–  –  –

III.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1)

• Call title: Joint Call ICT & Security 1



Pages:     | 1 |   ...   | 6 | 7 || 9 |


Similar works:

«A Waltz for Matilda by Jackie French Teaching Notes by Robyn Sheahan-Bright ISBN 9780732290214 RRP $18.99 Publication Date December 2010 CONTENTS Book description About the author Characters • The Significance of Character • Major Characters • Minor Characters • Character Arcs Themes Federation and Nationhood • Racism and Prejudice • 1890s Depression • Unionism and Workers’ Rights • Land Ownership and Management • Women’s Rights • Indigenous Beliefs • Key quotes...»

«Creative Life Passages Welcome to Life Ceremonies Baby Naming  “You have your own specific vocation or mission in life... therein you cannot be replaced, nor can your life be repeated. Thus, your task is as unique as your specific opportunity to implement it.” Viktor Frankl ~ Man’s Search for Meaning Gail C. McCabe PhD HUMANIST OFFICIANT SERVING HAMILTON, THE GTA AND THE GOLDEN HORSESHOE CONTACT 905-220-9072 OR 289-396-0060 E-MAIL gailmccabe@gmail.com WWW.CREATIVELIFEPASSAGES.COM...»

«American Eel (Anguilla rostrata) Abstract The American eel (Anguilla rostrata) is a freshwater eel native in North America. Its smooth, elongated, “snake-like” body is one of the most noted characteristics of this species and the other species in this family. The American Eel is a catadromous fish, exhibiting behavior opposite that of the anadromous river herring and Atlantic salmon. This means that they live primarily in freshwater, but migrate to marine waters to reproduce. Eels are born...»

«Summer 2000 115 Environmental Ethics and the Built Environment Roger J. H. King* I defend the view that the design of the built environment should be a proper part of environmental ethics. An environmentally responsible culture should be one in which citizens take responsibility for the domesticated environments in which they live, as well as for their effects on wild nature. How we build our world reveals both the possibilities in nature and our own stance toward the world. Our constructions...»

«Compiled Accounting Standard AASB 123 Borrowing Costs This compiled Standard applies to annual reporting periods beginning on or after 1 January 2009 that end on or after 30 June 2009. Early application is permitted. It incorporates relevant amendments made up to and including 25 June 2009. Prepared on 4 November 2009 by the staff of the Australian Accounting Standards Board. Obtaining Copies of Accounting Standards Compiled versions of Standards, original Standards and amending Standards (see...»

«DERECHO PENAL INTERNACIONAL 1) ANTECEDENTES Históricamente ha sido facultad del Estado soberano el ejercicio de la jurisdicción en materia penal, situación que fue cambiando paulatinamente conforme se fueron presentando atropellos de gran trascendencia para la humanidad al afectarse con esto, bienes jurídicos que por su importancia se consideran tutelados por toda la comunidad internacional. Al fin de la 1ª guerra mundial, se celebró la conferencia de paz de 1919, en la que los países...»

«Publish Book Listening Comprehension Passages With Questions And Answers books document, also Download PDF Listening Comprehension Passages With Questions And Answers digital file LISTENING COMPREHENSION PASSAGES WITH QUESTIONS AND ANSWERS PDF Download: LISTENING COMPREHENSION PASSAGES WITH QUESTIONS AND ANSWERS PDF LISTENING COMPREHENSION PASSAGES WITH QUESTIONS AND ANSWERS PDF Read title listening comprehension passages with questions and answers PDF? You will be glad to know that right now...»

«BANACH SPACES OF BOUNDED SZLENK INDEX ´ E. ODELL, TH. SCHLUMPRECHT AND A. ZSAK Abstract. For a countable ordinal α we denote by Cα the class of separable, reflexive Banach spaces whose Szlenk index and the Szlenk index of their dual are bounded by α. We show that each Cα admits a separable, reflexive universal space. We also show that spaces in the class Cωα·ω embed into spaces of the same class with a basis. As a consequence we deduce that each Cα is analytic in the Effros-Borel...»

«The Impact of Homelessness and Shelter Life on Family Relationships By: Elizabeth W. Lindsey Lindsey, E. W. (1998). The impact of homelessness and shelter life on family relationships. Family Relations, 47(3), 243-252. Made available courtesy of Wiley-Blackwell: The definitive version is available at http://www3.interscience.wiley.com ***Reprinted with permission. No further reproduction is authorized without written permission from Wiley-Blackwell. This version of the document is not the...»

«Missouri State-West Plains Catalog The Course Catalog is your informational guide to courses, programs, academic Catalog Resources policies, degree requirements, faculty teaching credentials and general information about Missouri State University-West Plains. As a key resource, this General Campus catalog will guide you along your particular path toward graduation and success. Information In addition to the information about Missouri State-West Plains and its programs and services, this catalog...»

«XV Open Cup named after E.V. Pankratiev Grand Prix of China, Division 2, Sunday, March 1, 2015 Problem A. Candies Input file: standard input Output file: standard output Time limit: 1 second Memory limit: 512 mebibytes n bobo are playing a game about candies. bobo are labeled by 1, 2,..., n for convenience. Initially, the i-th bobo has ai candies in hand. The game is played in m rounds. In each round, the bobo who has the least number of candies currently is awarded with x candies. If two...»

«MANUAL DE INSTRUCCIONES DE MOBIUS ACTIONCAM La imagen superior muestra una descripción de las distintas funciones. Los dos disipadores de calor pueden llegar a calentarse mucho durante la operación. Esto es normal, pero así todo nunca debe dejarse la cámara encendida cuando la temperatura exterior excede de 47 ºC (por ejemplo, en un coche aparcado a pleno sol). Si deseas usar la cámara en condiciones de mucho calor, deberías asegurarte de que los disipadores están refrigerados...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.