ANTONIO LIOY

Scarica il contatto come vcard Foto

Professore Ordinario

+39 0110907021 / 7021 (DAUIN)

Pagina web personale

Gruppi di ricerca TORSEC - Security Group
Laboratori LAB 7 - Research laboratory
Progetti di ricerca

Finanziati da bandi competitivi

  • SPIRS - Secure Platform for Ict systems Rooted at the Silicon manufacturing process, (2021-2024) - Responsabile Scientifico

    Ricerca UE - H2020 - Industrial Leadership – LEIT - ICT

    Abstract

    Our society is continuously demanding more and more intelligent devices, along with network infrastructures and distributed services that make our daily lives more comfortably. However, the frantic adoption of Internet of Things (IoT) technologies has led to widespread implementations without a deep analysis about security matters.This project encompasses the complete design of a platform, so-called SPIRS platform, which integrates a hardware dedicated Root of Trust (RoT) and a processor core with the capability of offering a full suite of security services. Furthermore, the SPIRS platform will be able to leverage this capability to support privacy-respectful attestation mechanismsand enable trusted communication channels across 5G infrastructures. RoT is implemented in hardware with a dedicated circuitry to extract a unique digital identifier for the SPIRS platform during its entire lifetime. To build a complete solution, the project also features a Trusted Execution Environment (TEE), secure boot, and runtime integrity. Furthermore, resilience and privacy protection are major concerns in this project, and it endeavors to the design of a decentralized trust management framework targeted to minimize the impact of Single Point of Failure (SPOF) risks and achieve adequate security and privacy tradeoffs. To facilitate the tasks of validation and testing, SPIRS platform is conceived as an open platform that can easily integrate other building blocks and facilities upgrades. The project goes beyond the construction of the SPIRS platform and it provides solutions to integrate it in the deployment of cryptographic protocols and network infrastructures in a trustworthy way, leveraging the RoT provided by the platform. To validate SPIRS results, the project considers two different scenarios: Industry 4.0 and 5G Technologies.

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • ROLLING OUT OSNMA FOR THE SECURE SYNCHRONIZATION OF TELECOM NETWORKS, (2020-2022) - Responsabile Scientifico di Struttura

    Ricerca UE - H2020 - Industrial Leadership – LEIT - SPACE

    Vedi la scheda del progetto su CORDIS

    ERC sectors

    PE7_6 - Communication technology, high-frequency technology PE7_8 - Networks (communication networks, sensor networks, networks of robots, etc.) PE6_5 - Cryptology, security, privacy, quantum crypto

    SDG

    Obiettivo 9. Costruire un'infrastruttura resiliente e promuovere l'innovazione ed una industrializzazione equa, responsabile e sostenibile

    Abstract

    The study of critical dependancies upon GNSS-derived time and position identifies telecomunications, emergency services, energy, finance, food and transport as the sectors where GNSS plays a key role. GNSS is used as a timing source for the synchronization of various types of network and has been recently dened as the backbone of the connected world and also the invisible utility. Some of these networks are classied as critical infrastructures and, together with other service infrastructures, pose security-related requirements on top of timing accuracy requirements. ROOT (Rolling Out OSNMA for the secure synchronization of Telecom networks) project will assess the benefits introduced by the Galileo OSNMA signal in the specific context of telecommunication network synchronization applications. It will estimate the increased resiliance brough by OSNMA to GNSS-based timing sources. ROOT will consider the requirements, such as accuracy, tollerance to timing outages, etc., posed by the 5G playground to guarantee the expected perfomance. ROOT will follow an experimental approach to demonstrate and measure the increased level of robusteness provided by new multi-frequency, OSNMA-ready Galileo receivers, when they slave multiple timing sources across the network. This will be combined to secure network synchronization distribution by means of Precision Time Protocol and its White Rabbit flavour; specific network-related Key Performance Indicators will be measured. ROOT will foster the adoption of Galileo signals featuring authentication mechanisms in terrestrial infrastructures dependant upon satellite-derived time. ROOT partners cover the whole value chain for critical infrastructures: from research to manufacturers of GNSS and timing components, from networks operators to experts in market strategies, the partners complement each other in terms of knowledge and competences. They collectively constitute a consortium capable of fulfilling the project objectives.

    Paesi coinvolti

    • Spagna
    • Belgio
    • Italia

    Enti/Aziende coinvolti

    • SEVEN SOLUTIONS SL
    • SEPTENTRIO NV
    • TELEFONICA INVESTIGACION Y DESARROLLO SA
    • POLITECNICO DI TORINO
    • VVA BRUSSELS

    Strutture interne coinvolte

  • Practical Autonomous Cyberhealth for resilient SMEs & Microenterprises, (2020-2023) - Responsabile Scientifico

    Ricerca UE - H2020 - Societal Challenges - Secure societies

    Vedi la scheda del progetto su CORDIS

    Abstract

    SMEs and MEs constitute a very large part of the economy and are thus integral to the EUs economic growth and social development. However, they often have no systematic approach for ensuring digital security and 60% of them not being able to recover economically from a cyberattack. PALANTIR aims at bridging the gap between large enterprises and SMEs/MEs, by providing multi-layered, infrastructure-wide threat monitoring, cyber-resiliency and knowledge sharing in a heterogeneous ecosystem, while at the same time being able to market these services to third parties in the form of Security-as-a-service (SECaaS). PALANTIR will implement a coherent privacy assurance, data protection, incident detection and recovery framework, focusing on the case of highly dynamic service-oriented systems and networks, taking advantage of their inherent programmability features and abstractions. PALANTIR will also focus on cyber-resiliency leveraging the features of service-oriented systems key building features by a) applying and exploiting Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies; b) considering emerging paradigms such as the application of scalable artificial Intelligence, standardization and threat-sharing techniques to risk analysis, network operation, monitoring and management and c) ensuring the SMEs compliance with the relevant data privacy and protection regulations in the data breach age, implementing the Privacy by Default and the Privacy by Design principles on how personal data is collected, used, transferred and stored between 3rd party businesses and entities. The end result will be an evolving, expandable and unified framework, tailored to the individual needs of every SME and ME, reducing the complexity level of usual security tools while still being affordable and thus attractive for adoption.

    Paesi coinvolti

    • Grecia
    • Lussemburgo
    • Slovenia
    • Spagna
    • Cipro
    • Regno Unito
    • Germania
    • Italia

    Enti/Aziende coinvolti

    • INFILI TECHNOLOGIES PRIVATE COMPANY
    • INCITES CONSULTING SA
    • SPACE HELLAS ANONYMI ETAIREIA SYSTIMATA KAI YPIRESIES TILEPIKOINONIONPLIROFORIKIS ASFALEIAS - IDIOTIKI EPICHEIRISI PAROCHIS YPERISION ASFA
    • SFERA IT STORITVE DOO
    • STRATIOTIKI SXOLI EVELPIDON
    • UNIVERSIDAD DE MURCIA
    • TELEFONICA INVESTIGACION Y DESARROLLO SA
    • UBITECH LIMITED
    • HEWLETT-PACKARD LIMITED
    • "NATIONAL CENTER FOR SCIENTIFIC RESEARCH ""DEMOKRITOS"""
    • NEC LABORATORIES EUROPE GMBH
    • POLITECNICO DI TORINO
    • FUNDACIO PRIVADA I2CAT, INTERNET I INNOVACIO DIGITAL A CATALUNYA
    • ORION INNOVATIONS PRIVATE COMPANY

    Strutture interne coinvolte

  • A coordinated framework for cyber resilient supply chain systems over complex ICT infrastructures, (2020-2023) - Responsabile Scientifico

    Ricerca UE - H2020 - Industrial Leadership – LEIT - ICT

    Vedi la scheda del progetto su CORDIS

    ERC sectors

    PE6_5 - Cryptology, security, privacy, quantum crypto

    Abstract

    Project FISHY aims at designing, developing, validating and demonstrating a coordinated framework for cyber resilience provisioning to guarantee a trusted supply chain of ICT systems, built upon distributed, dynamic, and often fundamentally insecure and heterogeneous ICT infrastructures. We propose to design a novel FISHY platform able to securely orchestrate a supply chain consisting of complex ICT systems end-to-end, - from the IoT ecosystem and the edge and cloud infrastructure over to the networking infrastructure connecting -, and enabling functionalities related to risks and vulnerabilities management, accountability and mitigation strategies as well as security metrics and evidence-based security assurance. Conceptually, FISHY platform uses intent-based interfaces to orchestrate both existing and beyond state-of-the-art security appliances in composed ICT scenarios leveraging capabilities of programmable network and IT infrastructure through a coordinated management. FISHY implements new strategies to leveraging data analytics, distributed ledger technology, intent-based security service orchestration, artificial intelligence and programmable network infrastructure. The platform is envisioned not only to facilitating adaptive system reconfigurations, but also reacting to and defying the effects of cyber attacks in real time of the ICT supply chain end-to-end, and in particular in the IoT domain. Finally, the FISHY proposes a comprehensive validation and demonstration strategy built upon three use cases from different sectors, including agriculture, manufacturing and transportation. The expected project outcome is a Proof-of-Concept (PoC) of the FISHY platform, along with the dissemination and ambitious exploitation strategies.

    Paesi coinvolti

    • Portogallo
    • Grecia
    • Slovenia
    • Germania
    • Svizzera
    • Spagna
    • Italia

    Enti/Aziende coinvolti

    • UNIVERSIDADE DO MINHO
    • OPTIMUM ANONIMI ETAIRIA TECHNOLOGIES PLIROFORIKIS
    • XLAB RAZVOJ PROGRAMSKE OPREME IN SVETOVANJE DOO
    • SONAE MC - SERVICOS PARTILHADOS, SA
    • SYNELIXIS LYSEIS PLIROFORIKIS AUTOMATISMOU & TILEPIKOINONION ANONIMI ETAIRIA
    • TECHNISCHE UNIVERSITAET BRAUNSCHWEIG
    • SPHYNX TECHNOLOGY SOLUTIONS AG
    • TELEFONICA INVESTIGACION Y DESARROLLO SA
    • UNIVERSITAT POLITECNICA DE CATALUNYA
    • POLITECNICO DI TORINO
    • ALTRAN INNOVACION SL

    Strutture interne coinvolte

  • Cyber Security Network of Competence Centres for Europe, (2019-2022) - Responsabile Scientifico

    Ricerca UE - H2020 - Industrial Leadership – LEIT - ICT

    Abstract

    With its aim to boost the effectiveness of the Security Union, the EU wishes to ensure that it retains and develops essential capacities to secure its digital economy, infrastructures, society and democracy. The EU has recognised that cybersecurity research, competences and investments are spread across Europe with too little alignment, and that there is an urgent need to step up investment in technological advancements that could make the Digital Single Market more cybersecure and overcome the fragmentation of EU research capacities.CyberSec4Europe will align and interconnect a vast pool of research excellence in existing centres and research facilities, bringing together cybersecurity expertise in an interdisciplinary manner while developing a governance model for the future European Cybersecurity Competence Network. The 43 consortium partners will consolidate and reinforce cooperation and synergies between the research and industrial communities, including SMEs. The 42-month project will strengthen the research and innovation competence and cybersecurity capacities of Member States to meet the increasing number of cybersecurity challenges in the future.The project has identified key demonstration cases in different industrial domains, including finance, healthcare, transportation and smart cities. These address prominent research areas in both the public and private sectors that correspond closely with real-world issues, cyber threats and security problems. Another important outcome will be the development of a cybersecurity skills framework model to be used as a reference by education providers, employers and citizens.

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • Johann Wolfgang Goethe Universität

    Strutture interne coinvolte

  • TETRACO - TECNOLOGIE PER TRADING E CONSUMO DI CONTENUTI, (2009-) - Responsabile Scientifico

    Ricerca Nazionale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • MIUR MINISTERO ISTRUZIONE UNIVERSITÀ E RICERCA
    • SYNAREA CONSULTANTS S.r.l.
    • INRETE S.R.L.
    • CEDEO SAS
    • Eurix s.r.l.
    • SINAPSI SPA

    Strutture interne coinvolte

  • CONSORTIUM AGREEMENT OPEN_TC: OPEN TRUSTED COMPUTING, (data sconosciuta-data sconosciuta) - Responsabile Scientifico

    Ricerca UE - VI PQ - IST

    Paesi coinvolti

    • AUSTRIA
    • ITALIA

    Enti/Aziende coinvolti

    • TECHNIKON FORSCHUNGS- UND PLANUNGSGESELLSCHAFT MBH
  • Deep-Augur 2, (2019-2019) - Responsabile Scientifico

    Ricerca UE

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • UPM - ETSAM - Universidad Politécnica de Madrid

    Strutture interne coinvolte

  • Hierarchical Open Manufacturing Europe, (2018-2021) - Responsabile Scientifico

    Ricerca Regionale

    Abstract

    The project focuses on defining the factory as a machine, a system in which the important components can be described as models that represent resources over time, in the Lean way.We will identify the requirements for the three models that represent the Smart factory:Lean Accounting, which variables and relations represent the economic model of the company that owns the factoryLean Manufacturing, which variables and relations represent the way of producingCost Engineering, which variables represent the product cost.The experimental development aims at making the whole factory a big measuring machine, by developing the following prototype infrastructure:Edge Computing network nodes and intelligent gatewaysCyber Physical System composed of:measuring machinemodelling machinereasoning and running machineuniversal interface machine.

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • ELBI INTERNATIONAL SPA

    Strutture interne coinvolte

  • Development of an eIDAS-openNCP Connector for cross border eHealth, (2018-2019) - Responsabile Scientifico

    Ricerca UE - CEF

    Paesi coinvolti

    • ITALIA
    • PORTOGALLO

    Enti/Aziende coinvolti

    • SPMS - Serviços Partilhados do Ministério da Saúde

    Strutture interne coinvolte

  • eID for University, (2018-2019) - Responsabile Scientifico

    Ricerca UE - CEF

    Abstract

    The eID4U proposal aims to enable the usage of the notified national eIDs of each memberstate in services offered by the European academic world. This is in response to the call for activity about “eIDASenabledErasmus Student eCard”. However, as most universities are moving away from physical cards (such assmart-cards) we propose to create a virtual student card based on the standard eIDAS attributes for physicalpersons, extended with those new attributes required for the academic environment. In turn, this is based on ourextensive experience in the projects Stork, Stork-2.0, and e-SENS, that paved the way and sustained the definitionand deployment of the current eIDAS eID infrastructure, with specific pilots about student mobility and services.The objectives of this proposal are: (1) the definition of attributes needed to support academic services for foreignstudents; (2) the support of these attributes by the eIDAS nodes of the participating member states; (3) the extensionof a set of existing academic services to support both eIDAS and the new attributes; (4) a test phase to gainexperience about the practical effectiveness of the adopted solution and prepare the operational phase of theextended services (to be started right at the end of the project).

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • Deep-Augur, (2018-2018) - Responsabile Scientifico

    Ricerca UE - EIT

    Abstract

    The traditional Deep PacketInspection (DPI) based traffic analysissolutions rely on accessing packetpayload to identify network flowsand require massive amounts ofresources (HW and SW). The DeepAugur Smart Traffic Analysersfacilitate and speed up thecharacterisation of network flowsby means of advanced Deep NeuralNetwork techniques.The current traffic analysis products relyon highly resource consuming inspectionof packet payload. The Deep Augur smarttraffic analysers (STA) are based on deeplearning techniques and can analyse networkflows (classify, predict, detect anomalies,etc.) without accessing the packet payload.The Deep Augur generator trains genericmachine learning components and producessmart traffic analysers tailored to solve theproblems of the customer network.

    Paesi coinvolti

    • ITALIA
    • SPAGNA

    Enti/Aziende coinvolti

    • UNIVERSIDAD POLITECNICA DE MADRID

    Strutture interne coinvolte

  • Securing against intruders and other threats through a NFV-enabled environmen, (2016-2019) - Responsabile Scientifico

    Ricerca UE - H2020 - Societal Challenges - Secure societies

    Abstract

    SHIELD project proposes a universal solution for dynamically establishing anddeploying virtual security infrastructures into ISP and corporate networks. SHIELD builds on the huge momentum of Network FunctionsVirtualisation (NFV), as currently standardised by ETSI, in order to virtualise security appliances into virtual Network Security Functions (vNSFs),to be instantiated within the network infrastructure using NFV technologies and concepts, effectively monitoring and filtering network traffic in adistributed manner. Logs and metrics from vNSFs are aggregated into an information-driven Data Analysis and Remediation Engine (DARE),which leverages state-of-the-art big data storage and analytics in order to predict specific vulnerabilities and attacks by analysing the network andunderstanding the adversary possibilities, behaviour and intent. The SHIELD virtual security infrastructure can either used by the ISP internally fornetwork monitoring and protection, but it can also be offered as-a-service to ISP customers; for this purpose, SHIELD establishes a “vNSF Store”,i.e. a repository of available virtual security functions (firewalls, DPIs, content filters etc.) from which the ISP customers can select the ones whichbest match their needs and deploy them to protect their infrastructure. This approach promotes openness and interoperability of security functionsand offers an affordable, zero-CAPEX security solution for citizens and SMEs. Moreover, SHIELD services can be easily scaled up or down,configured and upgraded according to customers’ needs, as opposed to security solutions based on monolithic hardware.

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • First Italian Crossborder eIDAS Proxy , (2016-2019) - Responsabile Scientifico

    Ricerca UE

    Abstract

    FICEP aims to design and implement the first version of the Italian eIDAS infrastructure. The main goal is the integration between the SPID federation and other European digital identity management systems. Thanks to FICEP, Italian citizens will be allowed to use their own SPID credentials across Europe.

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • AGENZIA PER L'ITALIA DIGITALE
    • TIM S.P.A.

    Strutture interne coinvolte

  • FICEP – First Italian Crossboard eIDAS Proxy, (2016-2019) - Responsabile Scientifico

    Ricerca UE - CEF

    Abstract

    We propose to develop and operate a customization of the eIDAS node to act as a service provider towards SPID (sothat notified eID schemas are accepted by the Italian infrastructure) and as an identity provider towards the rest of theEU (so that notified Italian SPID schemas are accepted by the other member states). This includes protocolconverters and data mapping layers, to comply with the specifications contained in the eIDAS implementing acts.We plan to deploy the PEPS as a modular element with three main components: one C-PEPS, to act as an identityand attribute provider for the Italian citizens accessing a foreign eIDAS node, and two S-PEPS, to act as the publicinterface for the Italian service providers (respectively in the public and private sector) towards the foreign eIDASnodes.As the implementation of eIDAS throughout the EU will likely be gradual until 2018, we will operate our PEPS tosupport not only the eIDAS profile of SAML but also the Stork and Stork 2.0 ones. In this way, by supporting all threeprofiles, we can ease transition towards full implementation of eIDAS while maintaining compatibility with thoseexisting applications (in Italy and abroad) based on the Stork infrastructures, to be gradually phased out.

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • FIDES - High Impact Initiative, (2015-2015) - Responsabile Scientifico

    Ricerca UE

    Abstract

    Building on results of relevant European initiatives, such as STORK, FutureID, Kantara and SDIM, theFIDES project defines a technical blueprint for a federated and interoperable identity managementplatform, compliant with the current regulations, such as eIDAS, Data Protection and the mostrelevant national legislations, such as SPID in Italy, in order to define suitable guidelines for aprivacy-preserving identity infrastructure service provider. The project provides development anddeployment of a pilot in a real world environment, which will involve identity services providedeither by a public administration or by a private.

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • POSTE ITALIANE S.p.A.

    Strutture interne coinvolte

  • CLIPS-CLOUD APPROACH FOR INNOVATION IN PUBLIC SERVICE, (2014-2014) - Responsabile Scientifico

    Ricerca UE

    Abstract

    The CLIPS project aims at introducing a new approach to deliver innovative public services, through the cloud-computing approach involving the community in the process (PPPP public-private-people-partnership). The main idea of CLIPS is to provide to the community a methodology and a toolkit which allow civil servants and other external stakeholders (both citizens and businesses) to co-operate in the conceiving and the development of new cloud-based services, starting from a set of basic micro-services already available in the "cloud". The cloud ecosystem of services envisaged by the project, starting with a set of basic micro-services, will increase its portfolio due both to the availability of newly aggregated innovative services (coming from the basic ones) and to migration of current public services into the cloud, following the EU spirit "build, connect & grow".The CLIPS objective is to set up and to deploy a platform on which to run the virtual environment, where to build the cloud solutions addressing the particular cases during the piloting phase of the project. This will be done in such a way that other administrations can benefit by the results of the identified solution, looking at the cross domains, cross processes and cross borders approach. All the cloud-based services will be designed in order to assure interoperability and reusability among systems and will be "open" to be available to a wider range of potential providers of aggregated services. As a desired side effect, this should lead to a healthy service market in which public sector can fairly and transparently choose the best providers to meet their communities' needs or can even make different possible alternatives available to people, who can have a free access to all information and data they need to make a considered choice

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • EIT ICT LABS PGA 2014, (2014-2014) - Responsabile Scientifico

    Ricerca UE

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • ASPIRE -ADVANCED SOFTWARE PROTECTION: INTEGRATION, RESEARCH AND EXPLOITATION, (2013-2016) - Responsabile Scientifico

    Ricerca UE

    Vedi la scheda del progetto su CORDIS

    Abstract

    Traditional security solutions based on custom hardware like smart cards, set-top boxes, and dongles, are not convenient on mobile devices like smartphones and tablets. Software protection is therefore utterly important; it can be a maker and breaker in domains like multi-screen mobile TV, software licensing, and credentials and sensitive data stored on mobile devices. However, current software protection techniques are incredibly hard to deploy. Moreover, they cost too much and limit innovation. Therefore many stakeholders in mobile devices need more trustworthy, cheaper software security solutions and more value for the money they spend on security.In this project, three market leaders in security ICT solutions and four academic institutions join forces to protect the assets of service, software and content providers. From their perspective, mobile devices and their users, which can engage in so-called Man-At-The-End (MATE) attacks, are not trustworthy.Our goal is to establish trustworthy software execution on untrusted mobile platforms that have a persistent or occasional network connection to a trusted entity at their disposal. With the ASPIRE solutions, we want mobile software security to become (1) trustworthy by leveraging on the available network connection and developing a layered security approach of strong protections; (2) measurable by developing practical metrics based on validated attack and protection models; (3) cheaper by integrating support for the protections into an industrial-strength ASPIRE Framework; (4) more valuable by enabling shorter time-to-markets; and (5) more productive by being more widely applicable.To provide software protection that is equally strong as the existing hardware-based protection, we will develop software protection techniques along five mutually strengthening lines of defense: data hiding, algorithm hiding, anti-tampering, remote attestation, and renewability. We will integrate compiler support for all lines of defense into the framework to enable service, software and content providers to automatically protect the assets in their mobile apps with the most appropriate local and network-based protection techniques. A decision support system will assist non-security-expert software developers to tune the tool chain for their assets and protection needs. This decision support system will reduce their time-to-market and lower their market entry ticket price. Research into appropriate models and metrics, as well in a protection evaluation methodology will support the system's design and development.We will demonstrate and validate the developed technology on three real-world use cases from the industrial partners in the mentioned domains, and in a public challenge. Whereas Europe currently leads in hardware protection, the ASPIRE project will allow it to remain competitive in the rapidly growing global mobile economy and society by allowing its mobile service providers to embrace software protection.

    Paesi coinvolti

    • Francia
    • Svizzera
    • Germania
    • Italia
    • Regno Unito

    Enti/Aziende coinvolti

    • THALES DIS FRANCE SA
    • NAGRAVISION SA
    • EDSI SNC
    • SFNT GERMANY GMBH
    • FONDAZIONE BRUNO KESSLER
    • POLITECNICO DI TORINO
    • UNIVERSITY OF EAST LONDON

    Strutture interne coinvolte

  • SECURED -SECURITY AT THE NETWORK EDGE, (2013-2015) - Responsabile Scientifico

    Ricerca UE

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • TENACE - PROTEZIONE DELLE INFRASTRUTTURE CRITICHE NAZIONALI DA MINACCE CIBERNETICHE, (2013-2016) - Responsabile Scientifico

    Ricerca Nazionale - PRIN

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

  • CA STORK2-SECURE IDENTITY ACROSS BORDERS LINKED, (2012-2015) - Responsabile Scientifico

    Ricerca UE

    Paesi coinvolti

    • ITALIA
  • STORK2 - SECURE IDENTITY ACROSS BORDERS LINKED, (2012-2015) - Responsabile Scientifico

    Ricerca UE

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • ATOS ORIGIN S.P.A.

    Strutture interne coinvolte

  • TCLOUDS- TRUSTWORTHY CLOUDS - PRIVACY AND RESILIENCE FOT INTERNET-SCALE CRITICAL INFRASTRUCTURE, (2010-2013) - Responsabile Scientifico

    Ricerca UE - VII PQ - COOPERATION - ICT

    Paesi coinvolti

    • AUSTRIA
    • ITALIA

    Enti/Aziende coinvolti

    • TECHNIKON FORSCHUNGS- UND PLANUNGSGESELLSCHAFT MBH

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • POSECCO-POLICY AND SECURITY CONFIGURATION MANAGEMENT , (2010-2013) - Responsabile Scientifico

    Ricerca UE - VII PQ - COOPERATION - ICT

    Paesi coinvolti

    • GERMANIA
    • ITALIA

    Enti/Aziende coinvolti

    • SAP AG

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • WEBINOS-SECURE WEBOS APPLICATION DELIVERY ENVIRONMENT, (2010-2013) - Responsabile Scientifico

    Ricerca UE - VII PQ - COOPERATION - ICT

    Vedi la scheda del progetto su CORDIS

    Abstract

    The webinos project will define and deliver an Open Source Platform and specific components for the Future Internet, which will enable web applications and services to be used and shared consistently and securely over a broad spectrum of converged and connected devices, including mobile, PC, home media (TV) and in-car units. Promoting a 'single service for every device' vision, webinos will move the existing baseline from installed applications to services, running consistently across a wide range of connected devices, ensuring that the technologies for describing, negotiating, securing, utilizing device functionalities and adapting to context are fit for purpose. Innovations in contextual description will be broad covering but not limited to device capabilities, network access, user identity and preferences, location, behaviourally induced properties and finally the more complex issue of the users' social network context.webinos will directly address security and privacy issues as part of Quality of Service that users of web services expect. The addressed challenges comprise: how to provision and adapt security across a range of devices, services, networks as well as how individuals can gain control over the privacy aspects of their web presence regardless of the service that is being used. Context and privacy are intimately intertwined: rich context is valuable but without user controlled privacy it becomes a liability.webinos will boost the industry migration towards web-based services. webinos can back this by providing inter-operable, standardised, open source technology utilizable across domains with direct commercially exploitable value. webinos will also act as an industry catalyst to encourage collaboration and discourage fragmentation in this space.There are strong industry moves towards Internet friendly and Internet integrated offerings, and there exists a window of opportunity to place this Web OS technology on a robust open foundation that will remove economic barriers to engagement, embody policy on data privacy in concrete technology (protecting consumers and enterprise) and creating a centre of web centric expertise (benefiting technical competitiveness).

    Paesi coinvolti

    • Germania
    • Regno Unito
    • Italia
    • Paesi Bassi
    • Grecia
    • Spagna
    • Svezia
    • Francia
    • Belgio

    Enti/Aziende coinvolti

    • BMW FORSCHUNG UND TECHNIK GMBH
    • VISIONMOBILE LIMITED
    • DOCOMO COMMUNICATIONS LABORATORIES EUROPE GMBH
    • UNIVERSITA DEGLI STUDI DI CATANIA
    • NEDERLANDSE ORGANISATIE VOOR TOEGEPAST NATUURWETENSCHAPPELIJK ONDERZOEK TNO
    • FUTURETEXT LTD
    • NATIONAL TECHNICAL UNIVERSITY OF ATHENS - NTUA
    • IMPLEO PROFESSIONAL SERVICES LIMITED
    • TECHNISCHE UNIVERSITAET MUENCHEN
    • T-SYSTEMS INTERNATIONAL GMBH
    • TELEFONICA INVESTIGACION Y DESARROLLO SA
    • AMBIESENSE LTD
    • ISTITUTO SUPERIORE MARIO BOELLA SULLE TECNOLOGIE DELL'INFORMAZIONE E DELLE TELECOMUNICAZIONI ASSOCIAZIONE
    • POLITECNICO DI TORINO
    • SONY MOBILE COMMUNICATIONS AB
    • ANTENNA VOLANTIS LIMITED
    • THE CHANCELLOR, MASTERS AND SCHOLARS OF THE UNIVERSITY OF OXFORD
    • SAMSUNG ELECTRONICS (UK) LIMITED
    • GEIE ERCIM
    • TELECOM ITALIA SPA
    • DEUTSCHE TELEKOM AG
    • IMINDS

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • STORK-SECURE IDENTITY ACROSS BORDERS LINKED, (2008-2008) - Responsabile Scientifico

    Ricerca UE - (Progetti diversi)

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • ATOS ORIGIN S.P.A.

    Strutture interne coinvolte

  • OTTIMIZZAZIONE DI UNA PIATTAFORMA TELEMATICA ESSENZIALE ED APERTA A NUOVI SERVIZI APPLICATA ALLA GESTIONE TELEMATICA DEGLI ACCESSI E DELLA DOMANDA DI TRASPORTO INDIVIDUALE IN AMBITO URBANO - OPENGATE, (2006-2008) - Responsabile Scientifico

    Ricerca Nazionale - FAR

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • POLITECNICO DI TORINO - AMMINISTRAZIONE CENTRALE
    • SWARCO MIZAR SPA
    • TIM S.P.A.
    • CENTRO RICERCHE FIAT
    • MOTOROLA ELECTRONICS S.p.A.
    • MIUR MINISTERO ISTRUZIONE UNIVERSITÀ E RICERCA
    • MAGNETI MARELLI SISTEMI ELETTRONICI S.p.A.
    • AXIS SRL AUTOMATION FOR INDUSTRIAL SYSTEM
    • 5T SCRL
    • Fata Engineering Spa

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • ANTICIPANDO GALILEO: PRODOTTI E SERVIZI A SUPPORTO DELLA MOBILITÀ E DELLA SICUREZZA (GAL.PMI), (2006-2008) - Responsabile Scientifico

    Ricerca Regionale - Docup Piemonte

    Abstract

    L'OBIETTIVO GENERALE DEL PROGETTO È QUELLO DI CONTRIBUIRE A CREARE IN PIEMONTE UN POLO DI COMPETENZE ECCELLENTI SULLE TECNOLOGIE E SUI SERVIZI BASATI SUL SISTEMA GALILEO.

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • FONDAZIONE TORINO WIRELESS

    Strutture interne coinvolte

    • Dipartimento di Elettronica
    • Dipartimento di Automatica Informatica
    • Dipartimento di Ingegneria del Territorio, dell'Ambiente e delle Geotecnologie
    • Dipartimento di Idraulica, Trasporti e Infrastrutture Civili
  • DESEREC - DEPENDABLE SECURITY BY ENHANCED RECONFIGURABILITY , (2006-2009) - Responsabile Scientifico

    Ricerca UE - VI PQ - IST

    Vedi la scheda del progetto su CORDIS

    Abstract

    Most of European critical activities rely on networked Communication and Information Systems (CIS), highly interconnected. CIS performance could be jeopardized by incidents of various kinds.A multi-disciplinary approach is compulsory to leverage their dependability by an alliance of three approaches:-Modeling and simulation: DESEREC devises and develops innovative approaches and tools to design, model, simulate, and plan critical infrastructures to dramatically improve their resilience.-Detection: DESEREC integrates various detection mechanisms to ensure fast detection of severe incidents but also to detect complex ones, based on a combination of seemingly unrelated events, or on an abnormal behaviour.-Response: DESEREC provides a framework for computer-aided counter-measures initiatives to respond in a quick and appropriate way to a large range of incidents to mitigate the threats to the dependability and rapidly thwarts the problem. CIS Re-configuration is the utmost mechanism for their survivability.DESEREC will respond efficiently to the three families of incidents which can occurs on a critical system: Attacks from the outside, Intrinsic failures and Misbehavior or malicious internal use.As incidents act with different time scales and impact levels, DESEREC includes three response loops working on 3 different answering times to provide a suited answer:-A few seconds to locally respond to a severe and well-characterized incident and to launch emergency curative procedure to avoid escalation process or dramatic damage.-Some minutes to detect very complex problem and to readjust the system (i.e. through computer aided reactions)-Some hours to build a new configuration optimized to resist to a new situation and validated through modeling and simulationDESEREC approach, framework, and tools apply to critical communication and information systems in order to improve their resilience and their dependability.

    Paesi coinvolti

    • Italia
    • Germania
    • Paesi Bassi

    Enti/Aziende coinvolti

    • CONSIGLIO NAZIONALE DELLE RICERCHE
    • INDUSTRIEANLAGEN BETRIEBSGESELLSCHAFT MBH
    • Business Unit of TNO Built Environment and Geosciences
    • POLITECNICO DI TORINO
    • TRUSTED LOGIC
    • GROUPE DES ECOLES DES TELECOMMUNICATIONS
    • UNIVERSIDAD DE MURCIA
    • BUDAPESTI MUSZAKI ES GAZDASAGTUDOMANYI EGYETEM
    • POLITECHNIKA WROCLAWSKA
    • RENFE-OPERADORA
    • EPT SAS
    • SEARCH-LAB SECURITY EVALUATION ANALYSIS AND RESEARCH LABORATORY, LTD
    • THALES SERVICES SAS
    • ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE
    • EADS DEFENCE AND SECURITY SYSTEMS
    • GMV SOLUCIONES GLOBALES INTERNET S.A.
    • INTRACOM S.A. TELECOM SOLUTIONS

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • CONSORTIUM AGREEMENT DESEREC - DEPENDABLE SECURITY BY ENHANCED RECONFIGURABILITY, (2006-2009) - Responsabile Scientifico

    Ricerca UE - VI PQ - IST

    Vedi la scheda del progetto su CORDIS

    Abstract

    Most of European critical activities rely on networked Communication and Information Systems (CIS), highly interconnected. CIS performance could be jeopardized by incidents of various kinds.A multi-disciplinary approach is compulsory to leverage their dependability by an alliance of three approaches:-Modeling and simulation: DESEREC devises and develops innovative approaches and tools to design, model, simulate, and plan critical infrastructures to dramatically improve their resilience.-Detection: DESEREC integrates various detection mechanisms to ensure fast detection of severe incidents but also to detect complex ones, based on a combination of seemingly unrelated events, or on an abnormal behaviour.-Response: DESEREC provides a framework for computer-aided counter-measures initiatives to respond in a quick and appropriate way to a large range of incidents to mitigate the threats to the dependability and rapidly thwarts the problem. CIS Re-configuration is the utmost mechanism for their survivability.DESEREC will respond efficiently to the three families of incidents which can occurs on a critical system: Attacks from the outside, Intrinsic failures and Misbehavior or malicious internal use.As incidents act with different time scales and impact levels, DESEREC includes three response loops working on 3 different answering times to provide a suited answer:-A few seconds to locally respond to a severe and well-characterized incident and to launch emergency curative procedure to avoid escalation process or dramatic damage.-Some minutes to detect very complex problem and to readjust the system (i.e. through computer aided reactions)-Some hours to build a new configuration optimized to resist to a new situation and validated through modeling and simulationDESEREC approach, framework, and tools apply to critical communication and information systems in order to improve their resilience and their dependability.

    Paesi coinvolti

    • Italia
    • Germania
    • Paesi Bassi

    Enti/Aziende coinvolti

    • CONSIGLIO NAZIONALE DELLE RICERCHE
    • INDUSTRIEANLAGEN BETRIEBSGESELLSCHAFT MBH
    • Business Unit of TNO Built Environment and Geosciences
    • POLITECNICO DI TORINO
    • TRUSTED LOGIC
    • GROUPE DES ECOLES DES TELECOMMUNICATIONS
    • UNIVERSIDAD DE MURCIA
    • BUDAPESTI MUSZAKI ES GAZDASAGTUDOMANYI EGYETEM
    • POLITECHNIKA WROCLAWSKA
    • RENFE-OPERADORA
    • EPT SAS
    • SEARCH-LAB SECURITY EVALUATION ANALYSIS AND RESEARCH LABORATORY, LTD
    • THALES SERVICES SAS
    • ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE
    • EADS DEFENCE AND SECURITY SYSTEMS
    • GMV SOLUCIONES GLOBALES INTERNET S.A.
    • INTRACOM S.A. TELECOM SOLUTIONS
  • OPEN_TC - OPEN TRUSTED COMPUTING , (2005-2009) - Responsabile Scientifico

    Ricerca UE - VI PQ - IST

    Vedi la scheda del progetto su CORDIS

    Abstract

    In today's networked environment, the well known lack of platform security has given rise to waves of successful attacks, resulting in severe damages to enterprises and potential failure of critical infrastructures.<br/>Building on the cost-efficient and widely deployed ¿Trusted Platform Module¿ (TPM) specified by the Trusted Computing Group (TCG) and the new generation of x86 CPUs from Intel and AMD, we will define and implement an open Trusted Computing framework.<br/>The architecture is based on security mechanisms provided by low level operating system layers with isolation properties and interfaces to Trusted Computing hardware. These layers allow to leverage enhanced trust and security properties of the platform for standard operating systems, middleware, and applications.<br/>The suggested architecture is applicable to a wide range of platform types, e.g. servers, GRID technology, mobile phones and industrial automation. It provides basic building blocks for complex, distributed scenarios with inherent, multilateral trust and security capabilities.<br/>To enable maximum community benefit, project results will be integrated in and distributed as Open Source software, supporting Linux in particular.Should the proposal be successful, first Open Trusted Computing prototypes could be available around the time when proprietary Trusted Computing operating systems and solutions are expected to hit the market.

    Paesi coinvolti

    • Germania
    • Turchia
    • Federazione Russa
    • Regno Unito
    • Belgio
    • Francia
    • Ungheria
    • Italia
    • Bulgaria
    • Spagna
    • Svizzera
    • Austria

    Enti/Aziende coinvolti

    • SUSE LINUX PRODUCTS GMBH
    • PORTAKAL TEKNOLOJI EGITIM DANISMANLIK YAZILIM TURIZM TAAHHUT VE TICARET LIMITED SIRKETI
    • RUHR-UNIVERSITAET BOCHUM
    • TECHNISCHE UNIVERSITAET DRESDEN
    • INTECH CLOSED JOINT STOCK COMPANY
    • THE CHANCELLOR, MASTERS AND SCHOLARS OF THE UNIVERSITY OF CAMBRIDGE
    • KATHOLIEKE UNIVERSITEIT LEUVEN
    • COMMISSARIAT A L' ENERGIE ATOMIQUE
    • BUDAPESTI MUSZAKI ES GAZDASAGTUDOMANYI EGYETEM
    • POLITECNICO DI TORINO
    • INFINEON TECHNOLOGIES AG
    • COMNEON GMBH & CO. OHG
    • TEHNICHESKI UNIVERSITET SOFIA
    • TECHNISCHE UNIVERSITAET MUENCHEN
    • AMD SAXONY LIMITED LIABILITY COMPANY & CO. KG
    • ASOCIACION ISECOM PARA LA INVESTIGACION EN LA SEGURIDAD Y LAS METODOLOGIAS ABIERTAS
    • ROYAL HOLLOWAY AND BEDFORD NEW COLLEGE
    • FORSCHUNGSZENTRUM KARLSRUHE GMBH
    • COMNEON GMBH
    • IBM RESEARCH GMBH
    • TECHNISCHE UNIVERSITAET GRAZ
    • TURKIYE BILIMSEL VE TEKNOLOJIK ARASTIRMA KURUMU
    • HEWLETT-PACKARD LIMITED

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • MESHADPTIVE HOME WIRELENESS NETS - MEADOW, (2005-2008) - Responsabile Scientifico

    Ricerca Nazionale - FAR

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • STMICROELECTRONICS S.R.L.
    • POLITECNICO DI TORINO - AMMINISTRAZIONE CENTRALE
    • CONSOFT SISTEMI SPA
    • CENTRO RICERCHE FIAT
    • C.N.R. - CONSIGLIO NAZIONALE DELLE RICERCHE
    • MOTOROLA ELECTRONICS S.p.A.
    • MIUR MINISTERO ISTRUZIONE UNIVERSITÀ E RICERCA
    • ALTO SISTEMI S.R.L.
    • DOMOSETTE S.R.L.
    • MEDIASERVICE.NET S.R.L.
    • SOLVE.IT

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
    • Dipartimento di Elettronica
  • POSITIF - POLICY-BASED SECURITY TOOLS AND FRAMEWORK, (2004-2007) - Responsabile Scientifico

    Ricerca UE

    Vedi la scheda del progetto su CORDIS

    Abstract

    POSITIF will develop a framework and tools for policy-based protection of networked systems and applications. A multi-level policy language will be used to describe the desired security policy (high-level requirements and/or detailed controls) while a system language will be used to describe the target system (interconnection topology, functional and security capabilities). A checker will evaluate if the desired policy can be implemented on the target system and will measure the achieved security level.Configurations for the security elements will then be automatically generated and deployed through the network. A monitor will use the security policy for proactive intrusion detection (an intrusion is anything that doesn't comply with the policy) in addition to standard reactive intrusion detection (check against attack patterns). The framework will be usable by any producer of a specific security block or tool because open standard-based languages, interfaces and protocols will be used for policy and system description, configuration instructions and deployment, threat monitoring (e.g. XML, SNMP, IPSP, SAML, IDXP, IDMEF). The framework will be complemented by a suite of security tools (both industrial-grade and open-source) that match the specification and will thus be directly usable within the framework.They will include high-speed (up to 10 Gbps) firewall, VPN and IDS that target the current challenges (wired/wireless protocols, IPv4/IPv6 networks, encrypted protocols, protocols on non-standard ports, XML-based application protocols, multimedia content, ...) and a lightweight security module (for workstations and mobile devices) to protect them against network attacks, make them part of the security system and permit secure download of new configurations. To get user requirements and for development test, the project includes three test beds: a metropolitan research environment, a geographic government network and a wired/wireless phone and ISP operator.

    Paesi coinvolti

    • Francia
    • Italia
    • Germania
    • Polonia
    • Federazione Russa
    • Spagna
    • Austria

    Enti/Aziende coinvolti

    • BULL SAS
    • MINISTERO DELLA GIUSTIZIA
    • PRESECURE CONSULTING GMBH
    • POLITECHNIKA WROCLAWSKA
    • ST. PETERSBURG INSTITUTE FOR INFORMATICS AND AUTOMATION OF THE RUSSIAN ACADEMY OF SCIENCE
    • UNIVERSIDAD DE MURCIA
    • STIFTUNG SECURE INFORMATION AND COMMUNICATIONS TECHNOLOGIES - SIC
    • VODAFONE OMNITEL N.V.

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • NASTEC-BUILDING TRUST IN NETWORKING IN NEWLY ASSOCIATED STATES THROUGH THE USE OF SECURE INFORMATION SOCIETY TECHNOLOGIES, (2001-2003) - Responsabile Scientifico

    Ricerca UE - VPQ - IST (SOCIETA' DELL'INFORMAZIONE)

    Paesi coinvolti

    • BELGIO
    • ITALIA

    Enti/Aziende coinvolti

    • CEE - COMUNITÀ ECONOMICA EUROPEA -

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • AIDA- ADVANCED INTERACTIVE DIGITAL ADMINISTRATION, (2000-2001) - Responsabile Scientifico

    Ricerca UE - VPQ - IST (SOCIETA' DELL'INFORMAZIONE)

    Paesi coinvolti

    • AUSTRIA
    • BELGIO
    • ITALIA

    Enti/Aziende coinvolti

    • CEE - COMUNITÀ ECONOMICA EUROPEA -
    • INFONOVA EDV
  • Sicurezza dei sistemi distribuiti, (1998-2000) - Responsabile Scientifico

    Ricerca Nazionale - PRIN

    Abstract

    -

    Paesi coinvolti

    • ITALIA

    Strutture interne coinvolte

    • Dipartimento di Automatica Informatica
  • Vedi altro

Finanziati da contratti commerciali

  • Certification of the IT system for an NTS Retail customer based in Italia for the electronic storage and telematic transmission of the sale data to the Agenzia delle Entrate, (2021-2021) - Responsabile Scientifico

    Prestazione di Servizi commerciale

    Paesi coinvolti

    • ITALIA
    • REGNO UNITO DI GRAN BRETAGNA

    Enti/Aziende coinvolti

    • NTS Retail KG
  • Analisi sull’adeguatezza della sicurezza informatica dell’architettura CED dell’ATC, (2021-2021) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • AGENZIA TERRITORIALE PER LA CASA DEL PIEMONTE CENTRALE

    Strutture interne coinvolte

  • Digital transformation - IOT e blockchain, (2020-2020) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • FORTE CHANCE PIEMONTE

    Strutture interne coinvolte

  • Algoritmi per l’analisi di pattern ricorrenti e per la previsione di attacchi cibernetici, (2020-2021) - Responsabile Scientifico

    Ricerca Commerciale

    Paesi coinvolti

    • ITALIA
    • REGNO UNITO DI GRAN BRETAGNA

    Enti/Aziende coinvolti

    • OneFirewall Alliance Ltd

    Strutture interne coinvolte

  • Modelli e metodi per la valutazione della resilienza ad attacchi cyber dei dispositivi automotive connessi, (2020-2021) - Responsabile Scientifico

    Ricerca Commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • Drivesec s.r.l.

    Strutture interne coinvolte

  • Verificazione tecnica proposta dalla società Modimar s.r.l. contro il Comune di Scilla, nei confronti della società Dinamica s.r.l., per l’annullamento, previa sospensione dell’efficacia, del provvedimento con cui è stata comunicata la non ammissione del costituendo raggruppamento temporaneo di professionisti, composto anche dalla società Modimar s.r.l., in relazione alla procedura aperta telematica per l’affidamento del servizio di progettazione definitiva ed esecutiva, coordinamento della sicurezza in fase di progettazione, direzione lavori e coordinamento della sicurezza in fase di esecuzione, per i lavori di “ammodernamento del porto di Scilla e delle infrastrutture di collegamento”., (2020-2020) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • Tribunale Amministrativo Regionale per la Calabria

    Strutture interne coinvolte

  • Certificazione del sistema di biglietteria MIMS ai sensi della normativa vigente, (2020-2020) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • Aditus s.r.l.

    Strutture interne coinvolte

  • Certificazione ai sensi della normativa vigente del sistema Autentiqubo 3.0, (2018-2018) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • AQ Lab s.r.l.

    Strutture interne coinvolte

  • Progettazione di un sistema informatizzato per la gestione integrata della produzione dalla presa in carico delle materie prime alla tracciabilità del prodotto finito con funzionalità di supporto alle decisioni e protezione dei dati raccolti ed analizzati, (2018-2019) - Responsabile Scientifico

    Ricerca Commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • PRISMA IMPIANTI S.P.A.

    Strutture interne coinvolte

  • Architetture dei server e dello storage (software defined data center); Architetture di rete (software defined networks); Infrastrutture convergenti; Tecnologie di virtualizzazione e container per i Sistemi Operativi (Microsoft, Linux, Solaris); Tecnologia dei microservizi; Cloud computing per i servizi interni (Openstack)”., (2017-2018) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • CONSOB

    Strutture interne coinvolte

  • Certificazione firmware di misuratori fiscali Olivetti dal punto di vista della conformità alle normative ministeriali vigenti in materia di sicurezza fiscale, (2017-2017) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • OLIVETTI S.P.A.

    Strutture interne coinvolte

  • VALUTAZIONE DELL'ARCHITETTURA DI SICUREZZA DEL SISTEMA SCOONTRI-NO, (2013-2014) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • ScontriNO s.r.l.

    Strutture interne coinvolte

  • CERTIFICAZIONE DEL SISTEMA DI BIGLIETTERIA ELETTRONICO 18 TICKETS, (2013-2013) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • 18 Months s.r.l.

    Strutture interne coinvolte

  • PERIZIA STRAGIUDIZIALE DI CONGRUITÀ COSTI E FUNZIONALITÀ DEL PROGETTO MOGHI, (2012-2012) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • CHEMTEX ITALIA S.R.L.

    Strutture interne coinvolte

  • CERTIFICAZIONE (VARIANTE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA..., (2012-2012) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • SKIDATA S.R.L.

    Strutture interne coinvolte

  • ANALISI DELLA SICUREZZA DEL CHIP E DEL PIN NELLE CARTE DI PAGAMENTO BANCOMAT E PAGO BANCOMAT, (2012-2013) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • CONSORZIO BANCOMAT

    Strutture interne coinvolte

  • ANALISI DELLA SICUREZZA DEL PIN NELLE CARTE DI PAGAMENTO ELETTRONICHE, (2011-2012) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • INTESA SANPAOLO S.P.A.

    Strutture interne coinvolte

  • CERTIFICAZIONE (VARIANTE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI ...., (2011-2011) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • SKIDATA S.R.L.

    Strutture interne coinvolte

  • CERTIFICAZIONE (INTEGRAZIONE) AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA, (2011-2011) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • SKIDATA S.R.L.

    Strutture interne coinvolte

  • CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA DI BIGLIETTERIA AUTOMATIZZATA WINTIC -JDK VE.2.0, (2010-2010) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • Crea Informatica s.r.l.

    Strutture interne coinvolte

  • CERTIFICAZIONE AI SENSI DELLA NORMATIVA ITALIANA DEL SISTEMA ACCESSI STADI DI SKIDATA, (2009-2009) - Responsabile Scientifico

    Consulenza commerciale

    Paesi coinvolti

    • ITALIA

    Enti/Aziende coinvolti

    • SKIDATA S.R.L.

    Strutture interne coinvolte

  • Vedi altro