BIECO
The general objective of BIECO is to develop a framework that enables measurable, risk-based trust while developing, deploying and operating complex interconnected ICT systems.
Objectives
We aim to achieve this by handling the reliability and trust aspects of ecosystem participants (ICT systems, ICT system components and actors) within the supply chain.
The following shows the specific SMART (Specific, Measurable, Achievable, Realistic, Time-bound) objectives of the project, taking into account the challenges of this kind of complex ecosystems.
Framework
Providing a framework that allows reinforcing trust in ICT supply chains (WP2).
Vulnerability assessment
Performing advanced vulnerability assessment over ICT supply chains (WP3).
Achieving resilience
Achieving resilience in ecosystems formed by unreliable components (WP4).
Extending auditing
Extending auditing process to evaluate interconnected ICT systems (WP5).
Advanced risk analysis
Provide advanced risk analysis and mitigation strategies that support a view of the complete ICT supply chain (WP6).
Security assurance
Perform evidence-based security assurance and a harmonized certification for ICT systems (WP7).
Industrial validation
Industrial validation of BIECO’s framework within IoT ecosystems (WP8).
Exploitable Results
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
About BIECO
The rationale behind BIECO’s concept is to deliver a framework for improving trust and security within ICT supply chains. These are complex ecosystems comprising several heterogeneous technologies, processes, actors (e.g., end-users, software or hardware providers and organizations) and resources, all of which generate or exchange data forming extremely complex information management systems.
The BIECO team is proud to announce
NEWS
BIECO Project – Methodology for Security Evaluation
We happily announce that BIECO has been presented at @YavaConf 2022! The session entitled "BIECO Project - Methodology for Security Evaluation" has been presented on Tuesday - September 27th, by Marcin Byra, @7bulls.com. The presentation is available here....
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond – Video
Dis you miss the opportunity to attend to the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+)? Don't worry! You can still see the video that D. Sara Matheu presented about the BIECO work performed within WP6. Abstract: While the...
WP3 Monthly meeting July 2022
After the face-to-face meeting of BIECO in June in Lisbon, where useful ideas for the correct development of the tools have been clarified and secured, the regular WP3 monthly meetings have been taken up. In the July meeting, the evolution of the different detection,...
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond
1st International Conference on 6G Networking BIECO participates this Friday 8th july in the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+). This conference provides an interdisciplinary forum to exchange innovative research ideas,...
BIECO first F2F meeting
BIECO Progress Meeting Agenda 7-9th June 2022, 09:00- 17:00 WET Location: UNINOVA – Building 1 – Campus da FCT-UNL, Quinta da Torre, 2829-516 Caparica Meeting Objectives: 1. Analysing the Review Meeting 2. Align the view of the...
GROOT: GdpR-based cOmbinatOrial Testing strategy (BIECO Version)
Short description In this video, the CNR presents GROOT, a generic combinatorial testing methodology specifically conceived for assessing compliance with the GDPR and its contextualization in the context of the access control domain, considering the peculiarity of the...