Add to favorites:
Share:
Proposals are expected to contribute to one or more of the following:
- Enhanced resilience against distributed cyber threats and adversarial attacks targeting interconnected systems, while preserving data privacy in highly dynamic and heterogeneous environments;
- Security solutions tailored to distributed computing systems including for example IoT and edge computing environments, integrating privacy-preserving mechanisms;
- Improved interoperability of security measures and cross-layer security, including the compatibility of privacy-enhancing technologies across different layers of the computing continuum and data spaces, and across providers in the multi-provider edge cloud continuum.
Scope:
This topic aims to advance security across the entire computing continuum, spanning IoT devices, edge computing, cloud infrastructures, AI computing environments, and data spaces. Proposals should address critical challenges such as ensuring data integrity in highly distributed and dynamic environments, implementing robust zero-trust architectures to secure interconnected and heterogeneous systems, and enabling comprehensive protection for sensitive data and processes. Privacy should be considered a core element of these approaches, ensuring that data confidentiality is preserved throughout its lifecycle, in compliance with relevant data protection frameworks, such as GDPR. Solutions are expected to deliver tangible and measurable security improvements across all layers of the continuum, prioritizing scalability, interoperability, trustworthiness, security and resilience against emerging threats.
Proposals are expected to address one or more of the following:
- Develop advanced security solutions for edge to cloud. For example, investigating lightweight cryptographic techniques, including in combination with or based on post-quantum cryptography, incorporated in zero-trust architectures, and decentralized security models to ensure end-to-end protection from edge to cloud, while maintaining privacy during data transmission and processing.
- Enhance interoperability of security measures across different computing layers. Exploring security protocols, identity and access management solutions, and cross-domain authentication mechanisms to seamlessly integrate security controls across diverse computing ecosystems, including privacy-preserving protocols that enable the secure and compliant data exchange.
- Develop portable, deployable PQC acceleration solutions through SW/HW secure co-design to secure user data and computing tasks across heterogeneous platforms and applications in all layers of the continuum.
- Improve resilience against distributed cyber threats. Exploring anomaly detection, including AI-driven anomaly detection, intrusion prevention techniques, and automated response mechanisms to counter emerging threats targeting interconnected infrastructures and data spaces, while upholding privacy through techniques such as federated analysis, secure multi-party computation, Fully Homomorphic Encryption or other.
Expected Outcome
Proposals are expected to contribute to one or more of the following:
- Enhanced resilience against distributed cyber threats and adversarial attacks targeting interconnected systems, while preserving data privacy in highly dynamic and heterogeneous environments;
- Security solutions tailored to distributed computing systems including for example IoT and edge computing environments, integrating privacy-preserving mechanisms;
- Improved interoperability of security measures and cross-layer security, including the compatibility of privacy-enhancing technologies across different layers of the computing continuum and data spaces, and across providers in the multi-provider edge cloud continuum.
Scope
This topic aims to advance security across the entire computing continuum, spanning IoT devices, edge computing, cloud infrastructures, AI computing environments, and data spaces. Proposals should address critical challenges such as ensuring data integrity in highly distributed and dynamic environments, implementing robust zero-trust architectures to secure interconnected and heterogeneous systems, and enabling comprehensive protection for sensitive data and processes. Privacy should be considered a core element of these approaches, ensuring that data confidentiality is preserved throughout its lifecycle, in compliance with relevant data protection frameworks, such as GDPR. Solutions are expected to deliver tangible and measurable security improvements across all layers of the continuum, prioritizing scalability, interoperability, trustworthiness, security and resilience against emerging threats.
Proposals are expected to address one or more of the following:
- Develop advanced security solutions for edge to cloud. For example, investigating lightweight cryptographic techniques, including in combination with or based on post-quantum cryptography, incorporated in zero-trust architectures, and decentralized security models to ensure end-to-end protection from edge to cloud, while maintaining privacy during data transmission and processing.
- Enhance interoperability of security measures across different computing layers. Exploring security protocols, identity and access management solutions, and cross-domain authentication mechanisms to seamlessly integrate security controls across diverse computing ecosystems, including privacy-preserving protocols that enable the secure and compliant data exchange.
- Develop portable, deployable PQC acceleration solutions through SW/HW secure co-design to secure user data and computing tasks across heterogeneous platforms and applications in all layers of the continuum.
- Improve resilience against distributed cyber threats. Exploring anomaly detection, including AI-driven anomaly detection, intrusion prevention techniques, and automated response mechanisms to counter emerging threats targeting interconnected infrastructures and data spaces, while upholding privacy through techniques such as federated analysis, secure multi-party computation, Fully Homomorphic Encryption or other.
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our premium members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Premium now and never miss an important opportunity again! Already a premium member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our premium members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Premium now and explore your personalized technology matches today! Already a premium member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Premium: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a Premium member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our Premium knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Premium now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.

