This paper, entitled ICT Trust, Security & Dependability Research strategy beyond 2010, will describe the final outputs of the IST SecurIST [1] project, whose objective was to create a clear European level strategy to drive ICT Security and Dependability research beyond 2010. The focus in the paper is on short to medium (up to 3 years) to long-term objectives (~3-10 years). This paper will develop the context of the project, the approach taken, research strategy, setting its objectives and results with reference of various inputs and outputs from a large constituency involved in ICT Trust, Security and Dependability areas that was ultimately co-ordinated by the SecurIST project
High-Level Overview. Aimed at large companies and "critical infrastructure". Good for setting goals ...
Trust has emerged as one of the key challenges for the Future of the Internet and as a key theme of ...
Today’s organizations need to be cyber resilient, equipped with advanced cybersecurity capabilities ...
To empower the citizen of the 21st century over the coming decades, Europe's Research Framework prog...
This paper provides a brief overview of SecurIST and an introduction to the Security Task Force Ini...
Industry and companies are benefiting significantly from the increased productiv-ity, competitivenes...
This paper contains a summary of a significant amount of findings carried out collectively by a glob...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
This paper briefly reviews some recent research in Cybersecurity in Europe funded by the European Co...
Trust has emerged as one of the key challenges for the Future Internet and as a key theme of Europea...
Today’s organizations need to be cyber resilient, equipped with advanced cybersecurity capabilities ...
This paper explains the service science approach to ICT security. The first half of 2011 should prov...
Since the events of 9/11/2001 security concerns have taken a notably greater importance on policy ag...
VTT has a broad range of security research ongoing in many areas of technology. The main areas have ...
The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Str...
High-Level Overview. Aimed at large companies and "critical infrastructure". Good for setting goals ...
Trust has emerged as one of the key challenges for the Future of the Internet and as a key theme of ...
Today’s organizations need to be cyber resilient, equipped with advanced cybersecurity capabilities ...
To empower the citizen of the 21st century over the coming decades, Europe's Research Framework prog...
This paper provides a brief overview of SecurIST and an introduction to the Security Task Force Ini...
Industry and companies are benefiting significantly from the increased productiv-ity, competitivenes...
This paper contains a summary of a significant amount of findings carried out collectively by a glob...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
This paper briefly reviews some recent research in Cybersecurity in Europe funded by the European Co...
Trust has emerged as one of the key challenges for the Future Internet and as a key theme of Europea...
Today’s organizations need to be cyber resilient, equipped with advanced cybersecurity capabilities ...
This paper explains the service science approach to ICT security. The first half of 2011 should prov...
Since the events of 9/11/2001 security concerns have taken a notably greater importance on policy ag...
VTT has a broad range of security research ongoing in many areas of technology. The main areas have ...
The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Str...
High-Level Overview. Aimed at large companies and "critical infrastructure". Good for setting goals ...
Trust has emerged as one of the key challenges for the Future of the Internet and as a key theme of ...
Today’s organizations need to be cyber resilient, equipped with advanced cybersecurity capabilities ...