Identity and Access Management
User authentication using arbitrary end-point devices to access one or multiple applications, systems or services, as well as governance to manage identity and access information across systems.
Trustworthiness and Resilience
Trust models and adaptive mechanisms which help transform, renew and recover systems/services in timely response to events.
Data and Cloud Security
Data protection techniques, privacy-aware data management, data encryption, security on cloud-based technologies and services.
Network and Mobile Security
Secure and trustworthy controls into network (e.g. IoT) devices and nodes like gateways, routers, connectors, actuators, sensors, mobile and end nodes.