Coordinatore | TRIALOG
Organization address
address: 25 RUE DU GENERAL FOY contact info |
Nazionalità Coordinatore | France [FR] |
Totale costo | 3˙788˙733 € |
EC contributo | 2˙899˙994 € |
Programma | FP7-ICT
Specific Programme "Cooperation": Information and communication technologies |
Code Call | FP7-ICT-2009-4 |
Funding Scheme | CP |
Anno di inizio | 2009 |
Periodo (anno-mese-giorno) | 2009-11-01 - 2013-01-31 |
# | ||||
---|---|---|---|---|
1 |
TRIALOG
Organization address
address: 25 RUE DU GENERAL FOY contact info |
FR (PARIS) | coordinator | 0.00 |
2 |
ESCRYPT GMBH EMBEDDED SECURITY
Organization address
address: LISE-MEITNER-ALLEE contact info |
DE (BOCHUM) | participant | 0.00 |
3 |
FRAUNHOFER-GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V
Organization address
address: Hansastrasse contact info |
DE (MUENCHEN) | participant | 0.00 |
4 |
IKERLAN S.COOP.
Organization address
address: Paseo J.M. Arizmendiarrieta contact info |
ES (MONDRAGON) | participant | 0.00 |
5 |
UNIVERSITAET SIEGEN
Organization address
address: HERRENGARTEN contact info |
DE (SIEGEN) | participant | 0.00 |
6 |
UNIVERSITE DE TOULOUSE II - LE MIRAIL
Organization address
address: ALLEES ANTONIO MACHADO contact info |
FR (TOULOUSE) | participant | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
The objective of TERESA is to define, demonstrate and validate an engineering discipline for trust that is adapted to resource constrained embedded systems. We define trust as the degree with which security and dependability requirements are met.nResource constrained embedded systems are characterized as follows:n•tThey belong to different application sectorsn•tComputing resource are mostly statically determined and allocated through a process consisting of a configuration phase and a build phasen•tThey are generally high integrity systems with strong assurance requirements. They therefore use advanced engineering disciplines.nThe proposed approach is to use a model-based repository of security and dependability patterns:n•tApplication sector trust models are defined as profiles (e.g. UML, SysML profiles), based on a common trust meta-modeln•tSecurity and dependability patterns, platform independent are identified and defined for each application sectors (some patterns could be used by several application sectors)n•tFormal properties on security and dependability are defined and validated for patterns used in application sectors requiring this level of assurancen•tPlatform dependent implementation of the patterns are of the patterns are guided with very precise requirementsnThe engineering process for resource constrained embedded systems will be validated in four application sectors: automotive systems, home control systems, industry control, and metering.