BIECO
The general objective of BIECO is to develop a framework that enables measurable, risk-based trust while developing, deploying and operating complex interconnected ICT systems.
Objectives
We aim to achieve this by handling the reliability and trust aspects of ecosystem participants (ICT systems, ICT system components and actors) within the supply chain.
The following shows the specific SMART (Specific, Measurable, Achievable, Realistic, Time-bound) objectives of the project, taking into account the challenges of this kind of complex ecosystems.
Framework
Providing a framework that allows reinforcing trust in ICT supply chains (WP2).
Vulnerability assessment
Performing advanced vulnerability assessment over ICT supply chains (WP3).
Achieving resilience
Achieving resilience in ecosystems formed by unreliable components (WP4).
Extending auditing
Extending auditing process to evaluate interconnected ICT systems (WP5).
Advanced risk analysis
Provide advanced risk analysis and mitigation strategies that support a view of the complete ICT supply chain (WP6).
Security assurance
Perform evidence-based security assurance and a harmonized certification for ICT systems (WP7).
Industrial validation
Industrial validation of BIECO’s framework within IoT ecosystems (WP8).
Exploitable Results
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
About BIECO
The rationale behind BIECO’s concept is to deliver a framework for improving trust and security within ICT supply chains. These are complex ecosystems comprising several heterogeneous technologies, processes, actors (e.g., end-users, software or hardware providers and organizations) and resources, all of which generate or exchange data forming extremely complex information management systems.
The BIECO team is proud to announce
NEWS
Fail-operation clock synchronization methodology
MENTORS – Monitoring Environment for System of Systems
MENTORS - Monitoring Environment for System of Systems Authors: Antonello Calabrò, Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 17th International Conference on Web Information Systems and...
GRADUATION: A GDPR-based Mutation Methodology
GRADUATION: A GDPR-based Mutation Methodology Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings/Workshop Publisher: Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information...
The GDPR Compliance Through Access Control Systems
The GDPR Compliance Through Access Control Systems Author: Said Daoudagh Document type: Thesis Published: ETD Archivio digitale delle tesi discusse presso l'Università di Pisa 20 July 2021
Second F2F Meeting, Vienna
The second BIECO F2F meeting held in Vienna from October 17-19, 2022, primarily aimed to discuss the BIECO project's current status, the use cases, and present an overview of the BIECO Framework. Additionally, the meeting focused on iterative improvements of the BIECO...
Reliability and Robustness of machine learning in Smart Ecosystems
Within the Smart digital Ecosystems (SES), the utilization of AI, and Machine Learning (ML) in particular, becomes increasingly prevalent scenarios designed for elevating the user experience of a system's functional performance. The BIECO approach on building trust in...