Logo Loading

Author: Sofia Esteves

M-Sec Architecture

M-Sec Architecture

Simplified view of M-Sec architecture Application Layer Application layer defines all the use the IoT technology or in which IoT has deployed Eclipse sensiNact Studio Eclipse sensiNact Studio SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to […]

READ MORE
All about the M-Sec Webinar on Use Cases Overview

All about the M-Sec Webinar on Use Cases Overview

On the 1st of July, M-Sec organized a Webinar on its 5 Use Cases in order to disseminate the project’s results achieved so far and engage stakeholders towards the adoption and/or development through project findings. In this engaging Webinar, participants had the chance to learn more about the following 5 Use Cases: Use Case 1: […]

READ MORE
Webinar – M-Sec project overview

Webinar – M-Sec project overview

M-Sec is developing an end to end secure IoT framework that allows the transfer of personal data without additional safeguards between the EU and Japan. M-Sec complies with GDPR, PIPA ,the Adequacy Agreement between EU&JP. and will be validated through its two crossborder use cases. In this webinar Vanessa Clemente Núñez, from Worldline, the M-Sec […]

READ MORE
Women in M-Sec

Women in M-Sec

My fellow project members suggested that we should have a post on international women day highlighting the importance of the day in the context of M-Sec. Challenge accepted. Let me start with a disclaimer related with personal life. The chain of command in my family is as follows: Daughter, Son, cat (female), wife, dog (male), […]

READ MORE
Is your smart city secure enough and what can you do about it?

Is your smart city secure enough and what can you do about it?

Currently, smart city platforms are mainly centralized IoT/Cloud infrastructures, which introduces several limitations as these infrastructures tend to be: Inefficient in handling actuation and control over sensors and physical devices; Prone to “complete failures” since they dispose with centralized control by a limited number of administrative entities; Inflexible in the incorporation of innovative applications and […]

READ MORE

Enter your keyword

X