H2020-DS-2014-1Sub call of: H2020-DS-2014-2015
|Publication date||11-12-2013||Deadline Date||28-08-2014 17:00:00 (Brussels local time)|
|Total Call Budget||€47,040,000||Main Pillar||Societal Challenges|
|Status||Closed||OJ reference||OJ C 361 of 11 December 2013|
Specific challenge: Security includes granting access only to the people that are entitled to it. Currently the most widespread approach relies on passwords. Managing the passwords has its limits and poses a challenge to the user, which adds vulnerabilities. Common practice is to use the same or similar password, which increases significantly the risk should the password be broken.
Scope: The focus is on the development and testing of usable, economic and privacy preserving access control platforms based on the use of biometrics, smart cards, or other devices. The solutions are to be installed and tested in a broad-band network, giving access to smart services running over networks with state-of-the-art security, avoiding single points of failure. Proposed work should include the management of the access rights in particular for the service providers, ensure the security and privacy of the databases, facilitate a timely breach notification and remediation to the user, and reduce the insider threat.
The proposed solutions have to guarantee interoperability and portability between systems and services, sparing the user to have to install a platform, service or country specific technology.
Proposed work could assist the objective of implementing a secure information sharing network.
The Commission considers that proposals requesting a contribution from the EU of between €3m and €8m EURO would allow this topic to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.
Proposals have to address the specific needs of the end-user, private and public security end user alike. Proposals are encouraged to include public security end-users and/or private end users.
Actions supported under this objective will deliver secure, but user-friendly, access to ICT systems, services and infrastructures, resulting in a consumerisation of devices for access control. The level of security of online services and critical infrastructures protected by these access systems should be demonstratably higher than by the state-of-the-art approach. The proposed solutions are expected to support the creation of commercial services making use of electronic identification and authentication.
Type of action: Innovation actions
Please read carefully all provisions below before the preparation of your application.
To see the budget earmarked for this topic, please look at the call budget distribution table by topic.
- List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
- Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
3.1 Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
- Proposal page limits and layout: Please refer to Part B of the standard proposal template.
- Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 3 months from the date of informing successful applicants.
- Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
- Additional provisions:
Horizon 2020 budget flexibility
- Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
You can download the same documents as one zip file from the call page
No submission system is open for this topic.