1 / 12

FET – Proactive Future and Emerging Technologies

FET – Proactive Future and Emerging Technologies. Call 3: FP7-ICT-2007-3. ICT Forever Yours - ICT-2007.8.6 “ designing for longevity, diversity and security ”. F1: FET – Proactive Jean-marie.auger@ec.europa.eu. FP7 FET Proactive Initiatives WP 2007-2008.

tevy
Télécharger la présentation

FET – Proactive Future and Emerging Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FET – Proactive Future and Emerging Technologies Call 3: FP7-ICT-2007-3 ICT Forever Yours - ICT-2007.8.6“designing for longevity, diversity and security” F1: FET – Proactive Jean-marie.auger@ec.europa.eu

  2. FP7 FET Proactive Initiatives WP 2007-2008 FET Proactive (Call 1) – Closed 8 May 2007 • Nano-scale ICT devices and systems • Pervasive Adaptation • Bio-ICT Convergence FET Proactive (Call 3) –Closing 8 April 2008 • Science of complex systems for socially intelligent ICT • Embodied Intelligence • ICT Forever Yours FET Proactive (Call 4, tentative) – Closing spring 2009 (tbc) • Massive ICT Systems • Human-Computer Confluence • QIPC and other quantum technologies

  3. ICT Forever Yours Origins • «Beyond the Horizon» CA • «Software Intensive systems» • Engineering adaptive SW intensive systems • Managing diversity in knowledge • Eternal SW intensive systems • «security, dependability and trust» • Ambient trustworthiness and its assessibility • Dynamicity of trust • Qauntum techno & crypto for information security http://cordis.europa.eu/fp7/ict/fet-proactive/ictfy_en.html • 2 past FET proactive initiatives: • Situated and Autonomic Communications • Global Computing

  4. ICT Forever YoursThe rationale and objectives “The mass diffusion of digital systems and their pervasiveness in our everyday lives increases our expectations on the dependability, security and longevity of these systems. This requires new built-in mechanisms for • enhancing confidence in their usage, • preserving them from the threat of ageing, • protecting them from malicious intents in the context of highly decentralised and incremental development and deployment practices.” designing for longevity, diversity and security

  5. ICT Forever YoursResearch Objectives ‘Projects should focus on one or several of the following:’ • Eternal systems • Self-sustaining, evolving, minimal intervention • Future proof • Knowledge, diversity and time • Exploiting locally maintained knowledge • Building on external knowledge • Secure and dependable software • Secure programming • ‘Assessability’ in context

  6. ICT Forever YoursResearch focus 1 Eternal Systems • to develop a theoretical and practicalframework for extremely long-lived systems, • requiring minimal intervention and management to thrive in spite of changes in: usage, host device, network context or data- and data protection formats… • Systems should be future proof, able to preserve and update their original functionality in a machine-independent way, and ultimately by being self-sustaining and evolving

  7. ICT Forever YoursResearch focus 2 Knowledge, diversity and time • New approaches for “eternal” and reliable access to knowledge assets, • knowledge parts are produced locally, but exploited globally, and are endowed with ‘a sense of time and context’ • robust against ageing, diversity of use and evolving semantics.

  8. ICT Forever Yours Research focus 3 Secure and dependable software (highly distributed and heterogeneous software or of ambient systems.) • Methods and tools for high-level verifiably secure and dependable programming, • new metrics to aid assessability of the security and dependability Verifiable security assessability Interactions of systems systems Secure design Secure programming

  9. ICT Forever YoursCoordination Action Coordination Actions • Consolidation of research communities • Visibility • Research agendas • National/regional research programmes or activities • International cooperation • …

  10. ICT Forever Yours Some expected impact The research should contribute to design systems versatile in their interaction with modules, systems, services in their environment: • adapting to change in the environment with minimal intervention; • harnessing dispersed and dynamic content by exchanging knowledge at a semantic level that is robust against diversity of origin and use; • preserving or adapting original functionality and properties over time; • providing security to their environment through verifiably secure programming models; • offering assessibility of security and dependability in the context of their environment.

  11. ICT Forever YoursBudget and funding schemes 20 M€ • CP (IP only) 19M€ • CSA (CA only) 1M€

  12. ICT Forever YoursFurther information Background documents ‘Beyond the Horizon’  • Software Intensive Systems • Security, dependability and trust http://cordis.europa.eu/fp7/ict/fet-proactive/ictfy_en.html FET info day: 24/01/08 – Brussels http://cordis.europa.eu/fp7/ict/fet-proactive/ie-jan08_en.html Contact: jean-marie.auger@ec.europa.eu wide.hogenhout@ec.europa.eu

More Related