ANIKETOS - Secure and Trustworthy Composite Services


Description

ANIKETOS helps establish and maintain trustworthiness and secure behaviour in a constantly changing service environment. The project aligns existing and develops new technology, methods, tools and security services that support the design-time creation and run-time dynamic behaviour of composite services, addressing service developers, service providers and service end users. ANIKETOS platform supports creating and maintaining secure and trusted composite services, and offers methods for analysing, solving, and sharing information on how new threats and vulnerabilities can be mitigated. Specifications, best practices, standards and certification work related to security and trust of composite services will be promoted for inclusion in European reference architectures.
Website
  • Skills/Topics:

    • security
    • trustiness
    • security engineering
Partners
Stiftelsen SINTEF (Coordinator Norway)
Consiglio Nazionale Delle Ricerche (IT)
Thales Services SAS (FR)
Liverpool John Moores University (UK)
SELEX /Elsag Datamat S.P.A. (IT)
SEARCH-LAB (Hungary)
Atos Origin S.A. (E)
Waterford Institute of Technology TSSG (Ireland)
Universita Degli Studi di Trento (IT)
Athens Technology Center SA (G)
SAP AG (Germany)
ITALTEL S.P.A. (IT)
Paris-Lodron-Universität Salzburg (A)
Deep Blue SRL (IT)
WIND Telecomunicazioni S.P.A. (IT)
Dimos Athinaion Epicheirisi Michanografisis (G)
Tecnalia (E).

Programme/Client:
EUROPEAN COMMISSION / FP7 - COOP - ICT

Our Role
Tecnalia services are focused on delivering the Aniketos Platform overall architecture and requirements, together with usage scenario descriptions, as well as the design and development of the model transformation module to transform security high level requirements into low level requirements in the services specification and service contract templates. Additionally Tecnalia works in a number of tasks within the project: Aniketos Platform integration, runtime secure composition and adaptation techniques, verification and end-user evaluation, community building and standardisation, demonstrations and training development and delivery, and dissemination and exploitation activities.