Esther Rodriguez
Spain

Mechanical forces transmitted through specific molecular bonds drive biological function, and their understanding and control hold an uncharted potential in oncology, regenerative medicine and biomaterial design. However, this potential has not been realised, because it requires developing and integrating disparate technologies to measure and manipulate mechanical and adhesive properties from the ...

Rachelle Blake
Germany

The EU-US eHealth Workforce Development Consortium has an overall goal of mapping, quantifying and projecting the need, supply and demand for workforce skills and competences, utilising these results to further develop IT skills and training programmes for the healthcare workforce. This work is a continuation and further development of the EU-US collaboration under the EU-US MoU eHealth Roadmap, l...

Marinos Ioannides
Cyprus

Virtual Multimodal Museum (ViMM) proposes a major, high-impact CSA across the field of Virtual Museums (VM), within the overall context of European policy and practice on Virtual Cultural Heritage (VCH). A highly expert seven (7) partner consortium will leverage the support of a unique and powerful Advisory Group, consisting of many of the Europe and the world’s leading public and private sect...

Dr. Angelos Amditis
Greece

Pluggable Social Platform for Heritage Awareness and Participation (PLUGGY) will support citizens in shaping cultural heritage and being shaped by it. PLUGGY will enable them to share their local knowledge and everyday experience with others. The participation will include the contribution of cultural institutions and digital libraries, building extensive networks around a common interest in conn...

Dr.-Ing. Klaus-Michael Koch
Austria

The VESSEDIA project will bring safety and security to many new software applications and devices. In the fast evolving world we live in, the Internet has brought many benefits to individuals, organisations and industries. With the capabilities offered now (such as IPv6) to connect billions of devices and therefore humans together, the Internet brings new threats to the software developers and VES...

Francois Koeune
Belgium

Implementing cryptography on embedded devices is an ongoing challenge: every year new implementation flaws are discovered and new attack paths are being used by real life adversaries. Whilst cryptography can guarantee many security properties, it crucially depends on the ability to keep the used keys secret even in face of determined adversaries. Over the last two decades a new type of adversary h...

Stefano Bianchi
Italy

The main objective of the ANASTACIA is to address the constant discovery of vulnerabilities in ICT components providing assurance that ICT systems are secure and trustworthy by design. To this end, ANASTACIA will research and develop a holistic security framework, which will address all the phases of the ICT Systems Development Lifecycle and will be able to take autonomous decisions using new netw...

Linda Strick
Germany

In recent years the ICT market has evolved toward a cloud-based approach. This shift together with the rapidly changing legal and regulatory landscape has heavily impacted security assurance, governance and compliance. The information security market players have tried to provide suitable solutions to cope with issues such as i) lack of means to provide higher level of assurance (e.g continuous mo...

Javier Augusto Gonzalez
Spain

To effectively respond to the multitude & complexity of cybersecurity challenges in smart-homes GHOST deploys a pioneering software-enabled ‘usable security’ solution. The project brings professional level security to the European citizens and to this end it: (a) increases the automation level & effectiveness of existing security services; (b) opens up the cybersecurity ‘blackbox’ to consu...

Dr. Juha Röning
Finland

Cybersecurity is one of todays most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioural aspects of IT systems and also needs to comply to the currently actively developing legal and reg...