WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 6 | 7 || 9 | 10 |   ...   | 12 |

«COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME (CIP) ICT POLICY SUPPORT PROGRAMME ICT PSP WORK PROGRAMME 2012 CIP ICT PSP work programme 2012 ...»

-- [ Page 8 ] --

The aim is to prepare for the deployment of the necessary infrastructure to realise the panEuropean in-vehicle emergency call interoperable service "eCall". In order to boost Member States or associated countries' investment in the infrastructure in a harmonised way to ensure the readiness of the emergency call response centres (Public Safety Answering Points - PSAPs) infrastructure and the interoperability of the service within the aimed roadmap (e.g., by end 2014), the pilot requires a wider adoption across more Member States or associated countries in order to test the proposed solution.

Conditions and characteristics

The pilot should include at least five additional relevant administrations (or legal – entities designated to act on behalf of the national administrations) from Member States or associated countries not yet represented in the HeERO Consortium. The additional administrations are to be already upgrading - or in the planning phase for upgrading their infrastructure to support the EU-wide eCall service.

The additional activities covered by the extension and the way they complement the – existing HeERO pilot have to be described in the proposal. In particular, the proposal

needs to address:

The use of the existing outcomes of the HeERO pilot, in particular the guidelines and procedures proposed by the project.

The assessment and testing of the relevant pan-European eCall standards that should be implemented into the eCall service value chain and make the service seamlessly interoperable EU-wide, including certification.

36 See http://www.heero-pilot.eu/

–  –  –

The upgrade of the Public Safety Answering Points (PSAPs) infrastructure in order to handle the 112 emergency call service in combination with the pan-European eCall service, based on the specifications to be adopted under the ITS Directive.

The upgrade of the mobile phone operators networks, including implementation of eCall discriminator ("eCall flag") to ensure the routing of eCalls to the most appropriate local emergency response centre as defined by the public authorities.

A commitment for long term deployment and sustainability of the eCall service beyond the pilot phase is required.

They should build on the work of the "European eCall Implementation Platform", and can address topics identified by the platform, such as protocols for the handling of silent eCalls, the transmission of the information from the PSAPs to the Traffic Management Centres, as well as the integration of other services within the eCall platform.

– The pilot extension should not exceed 24 months (starting from the entry into force of the extension) and has to be submitted by the coordinator of the running HeERO pilot, acting on behalf of all the participants in the existing project, together with the new participants.

Exploitation plan, dissemination and communication activities need to constitute an integral part of the proposed work, addressing not only experts, but also public authorities and relevant stakeholders who could play a role for the future deployment or replication of the envisaged solution/service, as well as the public at large.

– Proposal should include specific and realistic quantitative indicators to monitor progress at different stages in the project life.

Expected impact – Having an EU-wide interoperable eCall service deployed in Member States within the targeted roadmap (end 2014).

– Reinforcing consensus and partnerships among the stakeholders to support the fast rollout of these priority services across Europe.

–  –  –

THEME 5: TRUSTED E-SERVICES AND OTHER ACTIONS

The Digital Agenda for Europe promotes practical solutions for addressing threats that hamper efforts to promote an online economy such as: malicious software, online fraud and cyber-attacks. It also promotes the development of a new generation of web-based applications and services and the deployment of broadband for all.

Theme 5 will contribute to these in 2012 through:

Objective 5.1: Cybersecurity : with a particular focus on fighting botnets – Objective 5.2: Mobile cloud for business applications – Objective 5.3: Satellite contribution to 100% EU broadband coverage.

– The total EU funding available for this theme is 15 M€.

Objective 5.1: Cybersecurity

a) Fighting botnets Funding instrument: Pilot type B - It is intended to support one Pilot action for 8 M€ EU contribution Focus and outcomes The aim of this objective is to establish a European-wide pilot platform for detecting, measuring, analysing, mitigating and eliminating botnets37 and other cyber threats, thereby creating a European toolbox for fighting emerging cyber threats, building on existing initiatives of the Member States or associated countries and other European stakeholders.

The added value of a comprehensive European approach is widely recognised38 for an effective reduction of cyber threats and for increasing the level of security and trust in European cyberspace. Botnets are operated globally and, thus, an effective defence mechanism can not be limited to a national approach.

Currently, botnets are a major technical vehicle for cybercrime and cyber attacks and should be prioritised for fighting cyber threats. This pilot platform will specifically target botnets but have sufficient flexibility to extend to other emerging cyber threats.





The emphasis is on integrating and demonstrating existing technologies and processes as well as the development of good practices for the provision of innovative, effective and user-friendly cyber-security solutions. User-acceptance and economic viability for all stakeholders are important factors to be addressed.

Conditions and characteristics

The Pilot shall have the following characteristics:

The pilot is to address the identification, measurement, and analysis of botnets as well – as the prevention, detection, mitigation, recovery and evaluation of their impact. It should validate an EU-wide platform for addressing botnets threats.

37 A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

38 see for example: http://www.enisa.europa.eu/act/res/botnets/botnets-measurement-detection-disinfection-and-defence

CIP ICT PSP work programme 2012

The pilot needs to investigate and integrate best practices, state-of-the-art techniques – and tools for fighting and mitigating the impact of botnets and other cyber threats. This is to be done in close consultation with the Community building Thematic Network (see objective 5.1b) in order to ensure there is no duplication of effort. It should lead to the creation of a consolidated set of solutions that can be implemented and adapted by stakeholders according to existing and emerging cyber-threats.Solutions are to be practical, cost-effective and economically viable for all involved stakeholders and should include appropriate stakeholder incentives. They need to take into account the existing regulatory framework of the EU and Member States or associated countries.

Mechanisms for supporting users in preventing and removing malware as well as the – cleaning of infected websites should be operationally investigated. Possible opportunities and barriers for intervening with infected machines should be taken into account, in compliance with legislation and user rights.

Processes to support the identification and tracking down of Command & Control – (C&C) servers as well as communication channels between masters and bots should be investigated.

At least 3 experiments validating the proposed solutions against specific types of – botnets covering more than one Member State or associated country are to be tested and evaluated in an operational phase.

The pilot should include a representative group of European countries, including – relevant public administrations or agencies. Representative stakeholders of concerned private sector organisations (in particular Internet Service Providers) and academia are to be involved.

It should draw on existing initiatives in Member States and associated countries and at – European level (e.g. ENISA, EP3R, EFMS, Europol, EUCTF) and involve them in its activities. In addition, it is encouraged to liaise with other international initiatives and activities.

Common specifications and building blocks from the pilot shall be openly shared with – all Member States and associated countries independent of their participation in the project.

– Exploitation strategies, dissemination and communication activities need to constitute an integral part of the proposed work. Such activities should address not only experts, but also public authorities and relevant stakeholders who could play a role for the future deployment or replication of the envisaged solutions/services, as well as the public at large.

– The pilot should include specific and realistic quantitative indicators to monitor progress at all stages during the pilot.

Expected impact Increased cyber security.

– Enhanced innovation in the area of cyber security solutions and improved – competitiveness of European industry in this sector.

Improved European cooperation and coordination for effective measures against botnets – as a step towards enhanced global cooperation in the area.

–  –  –

Increased interoperability, effectiveness and economy of scale of individual cyber – security activities in Europe.

Standards and common specifications for fighting botnets.

b) Community building for information sharing and effective responses to cyber threats Funding instrument: Thematic Network - It is intended to support one Thematic Network for 1 M€ EU contribution Focus and outcomes Mutual trust and sharing of sensitive and confidential information on vulnerabilities, threats and attacks is crucial for building and implementing effective counterstrategies against botnets and emerging cyber threats. This Thematic Network will facilitate the identification of common requirements for technologies, processes and methods to address cyber threats and sharing of best practices for their deployment. It will accompany the Pilot on fighting botnets and support community building in this area.

Conditions and characteristics

The Thematic Network shall have the following characteristics:

The Thematic Network should bring together the relevant stakeholders in order to – develop requirements and guidelines for the deployment of technical solutions and sharing of best practices for dealing with cyber-threats. It should also favour a trusted information exchange regarding vulnerabilities, threats and attacks.

An enduring network infrastructure should be established for the identification of – emerging threats, coordination of countermeasures between stakeholders and consolidation of a community of cyber security professionals.

Regular workshops, seminars and trainings should be conducted as well as an online – facility for dissemination and interaction maintained to heighten awareness and disseminate competencies to all stakeholder groups across Europe and beyond.

It should liaise with existing stakeholders and initiatives on the European level (e.g.

– ENISA, EP3R, EFMS, OECD, Europol, CEPOL, ECTEG, EU-US Working Group on Cyber-Security and Cyber-Crime) as well as within the Member States or associated countries. It should also reach out to a wider set of relevant stakeholders from across Europe, as well as internationally, such as internet service providers, network operators and other information society service providers, the ICT and software industry, researchers as well as users.

Expected impact Strengthened partnerships across the sectors between stakeholder groups, increasing – mutual trust for future combined efforts against cyber-threats.

Accelerated adoption of innovative cyber-security solutions in the area of botnets across – an EU wide constituency.

Widened the awareness across the entire group of stakeholders on feasible ways of – fighting botnets in particular, and on measures to increase cyber-security in general.

CIP ICT PSP work programme 2012 Objective 5.2: Mobile cloud for business applications Funding instrument: Pilot type B - It is intended to support one or two pilot actions for 5 M€ EU contribution in total Focus and outcomes Mobile cloud computing provides access to cloud-based services through a mobile terminal, while data storage and processing happen mainly in the cloud and outside the device itself. Mobile cloud consumer oriented applications have started to appear in the market (e.g., for email or navigation) but this is not yet the case for mobile business applications in the cloud. The aim is to stimulate uptake of mobile cloud applications for customers and employees to access key business applications through smart devices.

One or two pilots will test and validate the use of these technologies for private business clouds and for business-focused productivity applications where collaboration, secure data sharing, and reliability are key factors. They will address the need to have mobile collaborative interactions through the communication network of the organisation. Aspects of security, trust, compliance and authentication will be duly taken into account, as well as manageability and remote support needed in business environments.

The pilots will focus on validating a platform allowing mobile cloud application developers, in particular SMEs to propose new business applications.

Conditions and characteristics



Pages:     | 1 |   ...   | 6 | 7 || 9 | 10 |   ...   | 12 |


Similar works:

«Asia Pacific Journal of Research Vol: I Issue XIII, January 2014 ISSN: 2320-5504, E-ISSN-2347-4793 A STUDY ON THE AWARENESS LEVEL OF LIC POLICY HOLDERS IN SALEM DISTRICT Dr.T.Thirupathi, Assistant Professor of Commerce, Government Arts College, (Autonomous), Salem, Tamil Nadu – 636 007 Introduction Life Insurance Corporation of India (LIC) is the largest insurance group and investment company in India. It is a state-owned company where the Government of India has 100% stake. It has assets...»

«POLICY TEMPLATE ACCESS CONTROL Operations Category: Approval: PVP Vice President Administration Responsibility: Date initially approved: September 1, 2005 Date: Date of last revision: November 5, 2013 Definitions: Change Keys – keys that allow access into a single room, or a suite of two or three rooms all keyed alike; e.g. an office or office area. Master Keys – keys that allow access into a group of rooms or buildings. There are three types: 1. Grand Master: allows access to all doors on...»

«Cultura política e ideología. Enfoques contrarios o complementarios. Sherline Chirinos Evelyn de Tortolero (Investigadores de INFACES) RESUMEN En el marco de la investigación de los aspectos culturales de la política, pueden identificarse dos enfoques que corresponden a otros tantos paradigmas en el campo de las ciencias sociales. Uno, que desarrolla el concepto de cultura cívica, desarrollada especialmente por los sociólogos norteamericanos Almond y Verba; otro, que gira en torno del...»

«Electoral System Reform in Canada: Objectives, Advocacy and Implications for Governance F. Leslie Seidle Discussion Paper F|28 Family Network October 2002 Canadian Policy Research Networks Inc. (CPRN) 600 – 250 Albert Street, Ottawa, Ontario K1P 6M1 Tel: (613) 567-7500 Fax: (613) 567-7640 Web Site: http://www.cprn.org Electoral System Reform in Canada: Objectives, Advocacy and Implications for Governance By F. Leslie Seidle Prepared for the Law Commission of Canada October 2002 © 2002...»

«IMPORTATORI DAL 1928 La Società, fondata nel 1928 dal Barone Amerigo Sagna, fin dai suoi inizi si è specializzata nell’importazione e distribuzione di vini, liquori e distillati d’altissima qualità. Negli ultimi anni soprattutto, la filosofia che ha ispirato le scelte della Società è stata la ricerca dei vini e distillati più prestigiosi, al fine di presentarsi come un punto di riferimento per tutti coloro che aspirano al meglio. Questa politica rigorosa, che rifugge le mode...»

«THE DEMOCRATIC QUALITIES OF COURTS: A CRITICAL ANALYSIS OF THREE ARGUMENTS Richard Bellamy The democratic critique of judicial review by constitutional courts has prompted its defenders to counter that courts have democratic qualities as good as, and in certain respects even stronger than, conventional democratic politics. This article offers a critical analysis of three arguments favouring this approach. The first argues that constitutional courts operate as exemplars of democratic...»

«An Affiliate of the Center on Budget and Policy Priorities 820 First Street NE, Suite 460 Washington, DC 20002 (202) 408-1080 Fax (202) 408-8173 www.dcfpi.org DISTRICT OF COLUMBIA’S TEMPORARY ASSISTANCE FOR NEEDY FAMILIES (TANF) PROGRAM Overview Temporary Assistance for Needy Families (TANF) is a federal block grant that DC and the states receive to provide income assistance, job training, and other supportive services to low-income families with children. Created by the Personal...»

«ADMINISTRATIVE COMMUNICATIONS SYSTEM UNITED STATES DEPARTMENT OF EDUCATION Office of Management, Executive Office 400 Maryland Avenue; Washington, DC 20202 Transmittal Sheet #: 2004-0014 Date: September 30, 2004 Distribution: All ED employees Distribution Approved: /s/ Directives Management Officer: Tammy Taylor Action: Pen and Ink Changes Title: Handbook for Software Management and Acquisition Policy Number: Handbook OCIO-08 Document Changing: Handbook OCIO-08, Handbook for Software Management...»

«Public Policy Formulation Through Non Moderated Crowdsourcing in Social Media Yannis Charalabidis1, Anna Triantafillou2, Vangelis Karkaletsis3, Euripidis Loukis1 University of the Aegean, Information and Communication Systems Engineering Dept., Gorgyras and Palama Str., 83200 Karlovassi, Samos, Greece {yannisx, eloukis}@aegean.gr Athens Technology Center, Rizariou Str. 10, 15233 Halandri, Athens, Greece a.triantafillou@atc.gr National Center for Scientific Research Demokritos, Institute of...»

«November 8, 2016 Elections Candidacy Requirements For U.S. House of Representatives Revised 12/28/2015 General Disclaimer This candidacy requirements bulletin provides an overview of Virginia electoral requirements. It is not legal advice nor a binding statement of official policy. Applicable laws and regulations are subject to change in content and interpretation. Candidates are responsible for verifying the status and complying with current laws and regulations. Introduction This bulletin and...»

«Policy memo Are sanctions an efficient tool for countering Russian activities in Ukraine? To: Federica Mogherini From: Klára Balounová, Sabina Nováková, Barbora Obračajová Date: December 1, 2015 Re: Policy Recommendation for the Strengthening of Sanctions against the Russian Federation _ I. Introduction This policy memo examines the effectiveness of the sanctions regime that has been adopted and consequently prolonged by the European Council in order to use non-military countermeasures...»

«8 POLICY ISSUES FACING THE MARKET FOR CREDIT DERIVATIVES Darrell Duffie THE FINANCIAL CRISIS has prompted calls for revamping the market for credit derivatives. For example, in a July 2008 speech, Fed Chairman Ben Bernanke noted that, “The Federal Reserve, together with other regulators and the private sector, is engaged in a broad effort to strengthen the financial infrastructure. In doing so, we aim not only to help make the financial system better able to withstand future shocks but...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.