Cybersecurity/Network and Information security

Available (134)

Showing 109 - 120 per page



Secret sharing -- Part 1: General

ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties. This document defines the parties involved in a secret sharing scheme, the terminology used in the context of secret sharing schemes, the parameters and the properties of such a scheme.

ISO/IEC 19592-1:2016

Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII

This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.

ISO/IEC 19086-4:2019

Jean-Pierre Quémard

Description of Activities

In this fellowship the original objective is to start to prepare a NWI to address the age approriate topic and start the standard development. The aim is to improve the benefits and reduce the risks in the digital world for young users up to the age of 18. The solution is to adapt the content delivered by online products and services according to the age of users. Moreover, the process requires establishing the age/capacity of users, including age verification and age estimation. The CWA does NOT define age estimation and verification processes (Out of scope) but requires to select an appropriate age assurance tools/approach in conformity with established standards and official guidance.

Fellow's country
Impact on society (7th Open Call)
Need for an EN: Many organizations engage with children intentionally; others engage with children in the course of their general activities. In each case the organization has a responsibility to that child to provide an age-appropriate service. This is not a marginal market, as one in three users is under 18.
The target stakeholders of this standard are society-wide: governments and policymakers; international institutions and civil society organizations; business and tech sector especially digital service providers; parents, teachers, and children.
The protection of children in the ICT world is a key issue and three domains are to develop complementary; including, age appropriate this work item, Age Assurance and Age verification. The two last topics are managed at ISO/IEC/JTC1/SC27/WG5 level the delineation between the three topics is important
Open Call
Organisation type
Organization
Kuzul An Traezehnn
Portrait Picture
Jean-Pierre Quémard
Proposal Title (7th Open Call)
Age appropriate standardisation
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Gill Whitney

Description of Activities

 

The standards being developed should cover the requirements of the full range of stakeholders (including users, affected bystanders and manufacturers etc) over the complete lifetime of the product.

 

Fellow's country
Impact on society (6th Open Call)
Cybersecurity standards have traditionally focused on the operation of the hardware, software and firmware of the systems. The needs of the human elements have often not been fully considered and negative viewpoints are sometimes heard in cybersecurity standards meeting with respect to untrained and/or vulnerable consumers/end users. By considering and supporting the `human element’ in products with digital elements (an essential element), it is hoped to reduce the potential for harm to the system and also to reduce the harm to the end user. In particular improved communication should reduce the physiological harm caused to the end user when something goes wrong and they think it is their fault. Cybersecurity standards for digital systems can thus be seen to support vulnerable users and to acknowledge that all end users can be vulnerable in specific circumstances
Open Call
Organisation type
Organization
Independent Expert
Portrait Picture
Gill Whitney
Proposal Title (6th Open Call)
Contribution to the modification of standards to facilitate their use by manufacturers and writers of associated vertical standards
Standards Development Organisation
StandICT.eu Year
2026
Year

Philippe Ombredanne

Description of Activities

The gaps that this fellowship enables me to address has been to dedicate solid time first for the ECMA meetings that I convened, but also for the community background work that needs support and attention. The priorities are to users the creation of the core specifications for ECMA approval, which has been challenging because of the influx of attention on PURL for SBOM and CRA compliance. The challenge from PURL getting increased attention meant needing to cater to new contributors and supporting long debates and addressing objections, in particular on topics like character encoding.

Fellow's country
Impact on SMEs (7th Open Call)
PURL makes it easier to integrate multiple SBOM tools for CRA compliance, lowering the costs of compliance for SMEs.
Impact on society (7th Open Call)
The expected impact of this project to usher PURL standardization will significantly improve the accuracy of how free and open source software packages are identified and reported in SBOMs. Software developers - both of open source projects and commercial software vendors - will be able to rely on a stable and widely-accepted international standard, across tooling and data for Software Composition Analysis (SCA), SBOMs, and open source compliance. This will greatly improve the overall security posture of any software using free and open source software packages which itself is the vast majority of software. As a universal identifier for packages, PURL enables the exchange of software inventories across partners in the software supply chain and SCA and SBOM tooling and data. This makes PURL the foundation of all SBOM and VEX standards, which are critical for cybersecurity and essential for compliance with upcoming regulations like the European Union's Cyber Resilience Act. Any recipient of an SBOM can rely on PURL as the unique identifier to query vulnerability databases for package metadata and other information about the package used in the software product or service.
Open Call
Portrait Picture
Philippe Ombredanne
Proposal Title (7th Open Call)
Standardize Package-URL (PURL): From community de-facto to international Ecma standard
Role in SDO
Standards Development Organisation
StandICT.eu Year
2026
Year

Walte Fumy

Description of Activities


This fellowship supports my engagement in ISO/IEC JTC 1 ‘Information technology’ is not on a working level (such as a contributor to specific standards) but on a strategic level.

Fellow's country
Impact on SMEs (6th Open Call)
While the nature of my engagement in ISO/IEC JTC 1 does not directly impact European SMEs, I have volunteered to participate in the StandICT.eu Mentorship Programme and to mentor new SME experts, who are less familiar with the workings of SDO technical committees, by providing guidance and advice.
Open Call
Organisation type
Organization
Independent Consultant
Portrait Picture
Walte Fumy
Proposal Title (6th Open Call)
communication and promotion of European interests in international ICT standardisation
Standards Development Organisation
StandICT.eu Year
2026
Year

Antoine Sciberras

Description of Activities


My work aims to rationalise the resulting compliance efforts through a dedicated Technical Report (TR) under ETSI CYBER. This report will help reduce legal ambiguity, support standardisation across sectors, and ensure proportional and efficient compliance.

Fellow's country
Impact on SMEs (6th Open Call)
This project has significant implications for SMEs across the EU. Many of these companies provide ICT services to regulated entities but may lack the resources to navigate complex, overlapping regulatory regimes. By providing a unified interpretation of NIS2 and DORA obligations, the project reduces uncertainty and helps SMEs avoid redundant compliance efforts.
Impact on society (6th Open Call)
Yes. The initiative is centred on the development of a new Technical Report within ETSI CYBER, aimed at clarifying the joint application of NIS2 and DORA. A formal proposal has been submitted and approved as a work item under ETSI CYBER’s work programme.
Open Call
Organisation type
Organization
University of Malta
Portrait Picture
Antoine Sciberras
Proposal Title (6th Open Call)
Contributing to the evolution of ICT standards by providing clarity where EU-level legislation currently creates operational ambiguity
Standards Development Organisation
StandICT.eu Year
2026
Year

Nicolae Paladi

Description of Activities

Through this fellowship, I am contributing to shape the standards around next-generation secure computing infrastructure. We are on the verge of a new paradigm where the security of the computing infrastructure is endorsed by hardware features and ensures protection of data at rest, in transit, and in use. 

Fellow's country
Impact on SMEs (5th Open Call)
Trusted execution environments (TEEs) allow deploying code and data in a separate, secure segment of computing platforms. Standardised security assessment and provisioning of configuration and personalisation information to Trusted execution environments (TEEs) can be a key contributor to more secure services and an enabler for new products and services.
Open Call
Organisation type
Organization
CEO CanaryBit.eu
Portrait Picture
Paladi
Standards Development Organisation
StandICT.eu Year
2026
Year

Denis Pinkas

Description of Activities

The use of digital identity wallets is foreseen to be the best appropriate solution to support an age verification method, which uses the date of birth of the individual without disclosing it.

Fellow's country
Impact on SMEs (5th Open Call)
If successful, the impact will not be restricted to European SMEs and/or European societies.
As my contributions are both for ISO and the IETF, the impact can be worldwide. However, I have not observed the presence of another European expert motivated by the topic of Age assurance systems that participates both in ISO JTC1 SC 27 and in the IETF.
Impact on society (5th Open Call)
The societal impacts can be important. Age assurance which entails age verification, age estimation and age inference is applicable for a large variety of use cases. Protection of children is the most prominent use case.
Open Call
Organization
CEO, DP Security Consulting SAS
Portrait Picture
Pinkas
Proposal Title (5th Open Call)
Age-restricted accesses to services while preserving the privacy of individuals
Standards Development Organisation
StandICT.eu Year
2026
Year

Daniel Waszkiewicz

Description of Activities

My work aims to develop robust frameworks for the verification of cryptographic protocols within the security of ICT products, services, and processes, thereby enhancing resilience against cyber threats.

Fellow's country
Impact on SMEs (4th Open Call)
Ensuring that protocols are rigorously verified according to standardised methodologies could, at least partly, lower the financial barriers for SMEs to enter the certification market, as the consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on SMEs (5th Open Call)
By implementing rigorous, standardized verification methods, the overall efficiency of the certification process would improve. This would, to some extent, lower financial entry barriers for SMEs in the certification market, as consistent and dependable protocol verification would simplify the certification of more intricate systems.
Impact on SMEs (6th Open Call)
A unified approach to the verification of cryptographic protocols within cybersecurity certification schemes could significantly reduce the costs and workload associated with certifying composite products or services. By ensuring that protocols are rigorously verified using standardized methodologies, the overall efficiency of the certification process would improve. This could, at least in part, lower the financial barriers for SMEs to enter the certification market, as consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on SMEs (7th Open Call)
A unified approach to the verification of cryptographic protocols within cybersecurity certification schemes could significantly reduce the costs and workload associated with certifying composite products or services. By ensuring that protocols are rigorously verified using standardized methodologies, the overall efficiency of the certification process would improve. This could, at least in part, lower the financial barriers for SMEs to enter the certification market, as consistent and reliable verification of protocols would streamline the certification of more complex systems.
Impact on society (4th Open Call)
My work is centred on creating robust frameworks for verifying cryptographic protocols within ICT products, services, and processes, ultimately strengthening resilience against cyber threats.
Impact on society (5th Open Call)
In the broader European context, my fellowship is poised to have a significant impact on cybersecurity practices, aligning with the objectives set forth by the Cybersecurity Act (CSA) and advancing European interests in bolstering digital security.
Impact on society (6th Open Call)
My primary focus is on developing standardized verification methodologies for cryptographic protocols, which play a key role in enhancing cybersecurity practices across Europe. I am working on creating robust frameworks for verifying these protocols within ICT products, services, and processes, ultimately contributing to greater resilience against cyber threats.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
Impact on society (7th Open Call)
My primary focus is on developing standardized verification methodologies for cryptographic protocols, which play a key role in enhancing cybersecurity practices across Europe. I am working on creating robust frameworks for verifying these protocols within ICT products, services, and processes, ultimately contributing to greater resilience against cyber threats.
The Cybersecurity Act (CSA) promotes the use of certification as an effective cybersecurity tool that can be applied consistently across Member States without creating unnecessary administrative burdens. Previously, products or services certified in one country often had to undergo similar procedures again when different national requirements were in place.
With the introduction of the European Cybersecurity Certification (EUCC) scheme, however, certificates issued under this framework will be legally recognized across all Member States once the corresponding Implementing Act is in force. This harmonization is essential for reducing duplicated efforts, saving time and resources, and ensuring consistent cybersecurity standards throughout Europe.
Organization
Cryptography specialist, National Institute of Telecommunications
Portrait Picture
wasz
Proposal Title (4th Open Call)
Developing ISO/IEC 29128 parts 2 and 3
Proposal Title (5th Open Call)
Progressing ISO/IEC 29128 parts 2 and 3
Proposal Title (6th Open Call)
Advancing ISO/IEC 29128 parts 2 and 3
Proposal Title (7th Open Call)
Advancing ISO/IEC 29128 parts 2 and 3
Standards Development Organisation
StandICT.eu Year
2026
Year

Johann Groszschaedl

Description of Activities

Improving security is one of the most, if not the most, important priorities for the evolution and future development of the IoT.

Fellow's country
Impact on SMEs (2nd Open Call)
MSP430 microcontrollers are deployed in thousands of IoT devices of European companies in all segments of the Embedded/IoT industry, ranging from automotive appliances over industrial control systems to medical devices. Many of the companies that designed and/or manufactured these devices are SMEs.
Impact on society (2nd Open Call)
This project has contributed to improve the security of the IoT since cryptographically strong E2E protocols are the foundation upon which secure architectures, systems and protocols can be built.
Open Call
Organisation type
Organization
University of Luxembourg
Portrait Picture
Johann
Proposal Title (2nd Open Call)
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things
Standards Development Organisation
StandICT.eu Year
2026
Year