Conditional Safety Certificates for ICT

Coordinated by

Conditional Safety Certificates (ConSerts) have been applied to support resiliency of ICT infrastructures. Support for deployment and execution of ConSerts in ICT infrastructure according to use case needs was provided additionally.


Describe the innovation content of the result:
ConSerts are models for supporting resilient operation. They have been adapted for use in ICT systems, and an executor component supporting interfaces to ICT systems for BIECO use case needs has been developed.
Who will be the customer?
Research and industry partners interested to deploy additional safeguards for assuring the resilient operation of their systems.
What benefit will it bring to the customers?
ConSerts can be used to confirm that (a) systems can be dynamically composed while respecting overall requirements and (b) operational conditions for dependable operation are still valid.
When is the expected date of achievement in the project (Mth/yr)?
Concept developed in D6.4 (12/2021) and development for UC1 finalized in (04/20223)
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?
Results already being incorporated into IESE projects.
What is the approximate price range of this result/price of licences?
Unclear; range depends on IESE project acquisition offers.
What are the market size in Millions € for this result and relevant trend?
See above.
How will this result rank against competing products in terms of price/performance?
Alternative options much more complex to engineer, much more customization needed at implementation level. Trade-off in deployment flexibility is USP.
Who are the competitors for this result?
Unclear; most alternatives would be developed in-house.
How fast and in what ways will the competition respond to this result?
Who are the partners involved in the result?
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
Have you protected or will you protect this result? How? When?
No explicit protection planned yet.

Other results


This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This