Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2024
License: CC BY
Data sources: ZENODO
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
ZENODO
Project deliverable . 2024
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

ENTRUST D3.2 ENTRUST Risk Assessment & Collective Threat Intelligence Framework – Initial Release

Authors: ENTRUST Horizon Europe;

ENTRUST D3.2 ENTRUST Risk Assessment & Collective Threat Intelligence Framework – Initial Release

Abstract

Towards providing operational assurance to organizations belonging to the medical domain, ENTRUST aims to ensure that the trustworthiness level of Connected Medical Devices (CMDs) remains at an acceptable level throughout their operational lifecycle. In this regard, this deliverable is dedicated to the detailed description of all components participating in the Trust Assessment process of ENTRUST throughout all three core phases of the ENTRUST action workflow, i.e., the Manufacturing Phase, the Predeployment Phase, and the Runtime Phase. First, we focus on the Formal Verification component, which is responsible for formally verifying the security processes of ENTRUST. Next, we describe the Threat Modeling and Software Verification component, which aggregates information from existing databases and formulates the attack vector for the device. This is forwarded to the Risk Assessment component, which evaluates the risk level for the device and calculates its Required Trust Level (RTL). We then describe the Trust Assessment Framework of ENTRUST (TAF) which is able to evaluate the Actual Trust Level (ATL) of the device. Next, the Digital Twin (DT) is able to emulate any incidents that led to a failed attestation process and identify new threats or vulnerabilities. The Secure Software Update module is then able to securely deploy updates as mitigation measures to patch such vulnerabilities. This document positions all aforementioned components within the overall ENTRUST framework and documents all interactions between them.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average