BIECO

The general objective of BIECO is to develop a framework that enables measurable, risk-based trust while developing, deploying and operating complex interconnected ICT systems.

Objectives

We aim to achieve this by handling the reliability and trust aspects of ecosystem participants (ICT systems, ICT system components and actors) within the supply chain.

The following shows the specific SMART (Specific, Measurable, Achievable, Realistic, Time-bound) objectives of the project, taking into account the challenges of this kind of complex ecosystems.

Framework

Providing a framework that allows reinforcing trust in ICT supply chains (WP2).

Vulnerability assessment

Performing advanced vulnerability assessment over ICT supply chains (WP3).

Achieving resilience

Achieving resilience in ecosystems formed by unreliable components (WP4).

Extending auditing

Extending auditing process to evaluate interconnected ICT systems (WP5).

Advanced risk analysis

Provide advanced risk analysis and mitigation strategies that support a view of the complete ICT supply chain (WP6).

Security assurance

Perform evidence-based security assurance and a harmonized certification for ICT systems (WP7).

Industrial validation

Industrial validation of BIECO’s framework within IoT ecosystems (WP8).

About BIECO

The rationale behind BIECO’s concept is to deliver a framework for improving trust and security within ICT supply chains. These are complex ecosystems comprising several heterogeneous technologies, processes, actors (e.g., end-users, software or hardware providers and organizations) and resources, all of which generate or exchange data forming extremely complex information management systems.

NEWS

MENTORS – Monitoring Environment for System of Systems

MENTORS - Monitoring Environment for System of Systems Authors: Antonello Calabrò, Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 17th International Conference on Web Information Systems and...

read more

GRADUATION: A GDPR-based Mutation Methodology

GRADUATION: A GDPR-based Mutation Methodology Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings/Workshop Publisher: Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information...

read more
BIECO Project – Methodology for Security Evaluation

BIECO Project – Methodology for Security Evaluation

We happily announce that BIECO has been presented at @YavaConf 2022!  The session entitled "BIECO Project - Methodology for Security Evaluation" has been presented on Tuesday - September 27th, by Marcin Byra, @7bulls.com. The presentation is available here....

read more

Consortium

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

close

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This