Suche senden
Hochladen
TSSG Security research unit May11_zdooly
•
Als PPTX, PDF herunterladen
•
0 gefällt mir
•
584 views
zdooly
Folgen
Technologie
Business
Melden
Teilen
Melden
Teilen
1 von 21
Jetzt herunterladen
Empfohlen
KATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , Korea
Gabriela Ehrlich
Legal and ethical issues (the LLM project)
Legal and ethical issues (the LLM project)
long lasting memories
How much can I trust my cloud services?
How much can I trust my cloud services?
ATMOSPHERE .
Patrick clark
Patrick clark
Boilerhouse Communications
New Product Introduction - Intellixir
New Product Introduction - Intellixir
Dr. Haxel Consult
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
5G Info Day
5G Info Day
The Knowledge Transfer Network Creative, Digital & Design
Empfohlen
KATS 4th Industrial Revolution Forum Seoul , Korea
KATS 4th Industrial Revolution Forum Seoul , Korea
Gabriela Ehrlich
Legal and ethical issues (the LLM project)
Legal and ethical issues (the LLM project)
long lasting memories
How much can I trust my cloud services?
How much can I trust my cloud services?
ATMOSPHERE .
Patrick clark
Patrick clark
Boilerhouse Communications
New Product Introduction - Intellixir
New Product Introduction - Intellixir
Dr. Haxel Consult
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
5G Info Day
5G Info Day
The Knowledge Transfer Network Creative, Digital & Design
Cloud Computing - Fergal O'Connor
Cloud Computing - Fergal O'Connor
healthcareisi
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
London School of Cyber Security
Ashely Madison Hack
Ashely Madison Hack
London School of Cyber Security
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
Weitere ähnliche Inhalte
Was ist angesagt?
Cloud Computing - Fergal O'Connor
Cloud Computing - Fergal O'Connor
healthcareisi
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
pijans
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
pijans
Was ist angesagt?
(16)
Cloud Computing - Fergal O'Connor
Cloud Computing - Fergal O'Connor
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
call for papers - International Journal on AdHoc Networking Systems (IJANS)
Andere mochten auch
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
London School of Cyber Security
Ashely Madison Hack
Ashely Madison Hack
London School of Cyber Security
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
The Panama Papers Hack
The Panama Papers Hack
London School of Cyber Security
ISIS and Cyber Terrorism
ISIS and Cyber Terrorism
London School of Cyber Security
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
London School of Cyber Security
Andere mochten auch
(9)
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
Ashely Madison Hack
Ashely Madison Hack
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
The Panama Papers Hack
The Panama Papers Hack
ISIS and Cyber Terrorism
ISIS and Cyber Terrorism
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
Ähnlich wie TSSG Security research unit May11_zdooly
Governing in the Cloud
Governing in the Cloud
Rolf Frydenberg
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
Jenny Jenish kyzy
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE .
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
EUBrasilCloudFORUM .
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE .
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
Wansoo Im
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
ATMOSPHERE .
Atmosphere: project objctives
Atmosphere: project objctives
EOSC-hub project
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Uni Systems S.M.S.A.
Shibboleth Access Management Federations and Secure SDI: ESDIN Experience
Shibboleth Access Management Federations and Secure SDI: ESDIN Experience
EDINA, University of Edinburgh
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
STO STRATEGY
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
Scott Clinton
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
Mark Skilton
The potential of the cloud
The potential of the cloud
Jisc
Paper id 27201448
Paper id 27201448
IJRAT
OEB Cyber Security Framework
OEB Cyber Security Framework
Norbi Hegedus
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
PaaSword EU Project
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
FAST-Lab. Factory Automation Systems and Technologies Laboratory, Tampere University of Technology
Ähnlich wie TSSG Security research unit May11_zdooly
(20)
Governing in the Cloud
Governing in the Cloud
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
EOSC-hub Week - Cloud Lightning Talks: Atmosphere
Atmosphere: project objctives
Atmosphere: project objctives
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Shibboleth Access Management Federations and Secure SDI: ESDIN Experience
Shibboleth Access Management Federations and Secure SDI: ESDIN Experience
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
Cloud computing security issues and challenges
Cloud computing security issues and challenges
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
The potential of the cloud
The potential of the cloud
Paper id 27201448
Paper id 27201448
OEB Cyber Security Framework
OEB Cyber Security Framework
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
Kürzlich hochgeladen
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Kürzlich hochgeladen
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
TSSG Security research unit May11_zdooly
1.
Security Research Unit
Presented by Zeta Dooly
2.
Research Units Research
Units 2
3.
Research Unit -
Projects 3
4.
Overview TSSG's
Security Research Unit investigates a number of research topics in the area of IT security
5.
6.
Trust principals for
use in
7.
Single service
8.
Sets of independent
services
9.
10.
Scalable framework for
secure service composition.
11.
Identity and
Privacy technologies
12.
Identity management/provisioning
13.
Privacy preserving
across networks, services and applications.
14.
Data Protection Access
Control
15.
16.
Securing critical
infrastructures
17.
Financial infrastructures
18.
Energy
19.
Transportation
20.
Service policy continuity
21.
22.
23.
Atos Origon
24.
Hewlett Packard
25.
IBM
26.
SAP
27.
University of
Darmstadt
28.
University Tilburg
29.
30.
PASSIVE
31.
32.
Align existing
and develop new technologies that support the design-time creation and run-time dynamic behavior of composite services.
33.
Addressing
34.
Service developers
35.
Service providers
36.
37.
38.
Identification of responsible
party
39.
Self-protection
40.
Trust evaluation
41.
Security validation
42.
Discovery and composition
support based on trustworthiness, security properties and metrics
43.
Relevant threat awareness
44.
Trust and security
monitoring
45.
Threat notificationRuntime 13
46.
47.
Extends our work
in CoMiFin (Trust Manager)
48.
Community Building
49.
WP leader, opensource
community, networking
50.
Secure Behaviour in
composition
51.
Testbed to investigate
the scalability of service composition security (STACS)
52.
Response to
changes and threats, notification, adaptation
53.
54.
Virtualisation holds
promise for eGov applications.
55.
56.
Threats from co-hosted
operating systems detected and dealt with
57.
58.
Privacy Rules Definition
Language (PRDL)
59.
Express EU Directives
on Data Protection
60.
Express National implementations
of Directives (Italy, Netherlands, Spain, Ireland)
61.
Express User Consent
& Privacy Policies
62.
PRDL Editor, PRDL
Engine, Technology adapters (e.g. PRDL -> XACML)
63.
End-User Verification Tools,
Accountability
64.
65.
66.
By whom
67.
What aspects
of the company privacy policy allow for this access.Access Control User Data
68.
69.
Future Internet Forum
(CeFims)
70.
3rd Irish Future
Internet Forum-June 1st 2011
71.
Recently commenced 2
projects in FI PPP
72.
FINSENY (use case-smart
grids)
73.
INFINITY (CSA-infrastructures &
interoperability support core platform & use cases)
74.
Hinweis der Redaktion
As opposed to static, in-house services
Jetzt herunterladen