Social challenges


Grants for Collaborative Projects, including Research, innovation close to market, Coordination and Support Actions, and other new schemes (i.e. prizes, innovative public procurement, etc…) oriented to Political Priorities and Challenges of the Europe 2020 Strategy.

Need funding for your R&D project?


  GRANTS FOR DIGITAL SECURITY: CYBERSECURITY, PRIVACY AND TRUST
DS-7-2015 Value-sensitive technological innovation in Cybersecurity CALL CLOSED
Specific challenge:New digital technologies are all around us but their impact on society is often difficult to assess, let alone predict. The rapid development and expansion of the digital ecosystem confronts society with numerous challenges to...
DS-1-2014 Privacy CALL CLOSED
Specific challengeMany online users are reluctant to disclose personal information online because of privacy concerns. Personal data has become an economic asset, but it is not the owners, i.e. the users, that control or monetize it. This is in...
DS-2-2014 Access control CALL CLOSED
Specific challengeSecurity includes granting access only to the people that are entitled to it. Currently the most widespread approach relies on passwords. Managing the passwords has its limits and poses a challenge to the user, which adds vulnerabilities....
DS-3-2015 The role of ICT in Critical Infrastructure Protection CALL CLOSED
Specific challengeCommunication and computing networks are not only critical infrastructures on their own, but underpin many other critical networks (e.g. energy, transport, finance, health …). In addition they are critically dependent on ICT technology....
DS-4-2015 Secure Information Sharing CALL CLOSED
Specific challengeTo protect our society and economy against accidental or man-made disruptions of the information and communication technologies they so much depend on an efficient exchange of information on vulnerabilities, incidents or attacks...
DS-5-2015 Trust eServices CALL CLOSED
Specific challengeThe implementation of trust eServices in specific applications areas like health, public administration, eCommerce includes the provision of electronic signatures, e-seals, timestamps or certified electronic delivery. The deployment...
DS-6-2014 Risk management and assurance models CALL CLOSED
Specific challengeThe ability to assess, manage, reduce, mitigate and accept risk is paramount for an effective protections against cybersecurity threats and incidents. The dependence of networks and information systems, that are essential for the...