This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Cybersecurity Certification Requirements for Supply Chain Services
Partner | MAGGIOLI GROUP |
Authors | Pinelopi Kyranoudi, Eleni Maria Kalogeraki, Alexandra Michota, Nineta Polemi |
Title | Cybersecurity Certification Requirements for Supply Chain Services |
DOI | |
Abstract | Supply Chain Services (SCS) are the backbone of any economy and their security is most important for the competitiveness, prosperity and resilience of the European Digital Single Market. Security certification of the SCS is the necessary mitigation measure towards the trustworthiness of the digital economies. This paper presents the building blocks and requirements for the certification of the SCS. |
Publication medium | conference |
Name | 26th IEEE Symposium on Computers and Communications (ISCC 2021) |
Date of the conference: | 06/09/2021 |
Location | Athens, Greece |
Is this a peer-reviewed publication? | Yes |
Is this a joint public/private publication? | No |
KEY FACTS
Project Coordinator: Sofoklis Efremidis
Institution: Maggioli SPA
Email: info{at}cyrene.eu
Start: 1-10-2020
Duration: 36 months
Participating organisations: 14
Number of countries: 10
TWEETS by
Join @CYRENE_H2020 at the #CyberHOT #SummerSchool 2022 on September 29-30, 2022, under the auspices of the @nmiotc, and advance your #security knowledge to practical, effective #cyber incident expertise! Registrations are open:
Read More@CYRENE_H2020 partners gathered for their 6th plenary #meeting on Thursday the 16th and Friday the 17th of June 2022, in Chania, Greece. The consortium members took the chance to meet face-to-face for the first time! The meeting was hosted by #TSI
Read More📢New Blogpost! In this article, Dr. Sofia Karagiorgou from @UBITECH_GR explains the Multiple Visual Analytics over Dark Web and how this is utilized in CYRENE. Read the article here: #Cybersecurity #supplychains #supplychainmanagement #darkweb
Read MoreThere are several attacks regarding #IoT devices: Man-in-the-Middle Attacks, Eavesdropping, Firmware hijacking, DDoS, Physical tampering...We will try to detect some of them using the @CYRENE_H2020 integrated system in the next period setting the appropriate pilot cases
Read MoreFUNDING
This project has received funding from the European Union’s Horizon 2020 Research and Innovation program under grant agreement No 952690. The website reflects only the view of the author(s) and the Commission is not responsible for any use that may be made of the information it contains.