Skip to main content
WP1 BMaaS
1.3
Extension of the chain of trust to the CPU and GPU
1.4
Certification documentation for the BMC Chain of Trust and innovative building blocks on Provencore
1.6
BMaaS Benchmarks and certifications studies
WP2 Edge
2.1
Requirements studies and specifications for Edge solutions
2.2
Monitoring systems for detecting failures and security incidents in Cloud-Edge environments, v1
2.3
Cloud-Edge orchestration solutions considering security, resources and energy efficiency, v1
2.5
Monitoring systems for detecting failures and security incidents in Cloud-Edge environments, v2
2.6
Cloud-Edge orchestration solutions considering security, resources and energy efficiency, v2
2.7
Report on the feasibility of using ProvenCore to implement secure execution enclaves
WP3 MLOps & AI
3.1
MLOps solutions for Edge to Cloud environments
3.2
Proof of concepts for MLOps solutions in Edge to Cloud environments
WP4 Decarbonization
4.1
Carbon footprint management platform services
WP5 IAM for users and objects
5.2
Prescriptive IAM Solution
5.3
Object Identity Solution
5.4
IDaaS proof of concept
5.5
Prescriptive IAM proof of concept
5.6
Object Identity proof of concept
WP6 KMS, Data Protection, MDR
6.1
KMS solution for the Cloud
6.2
Container security solution in Edge to Cloud environments
6.3
MxDR solution in Edge to Cloud environments
6.4
Data sanctuary for the Cloud
6.5
Container security proof of concept for DevSecOps
6.6
MxDR proof of concept
6.7
Data Sanctuary Proof of concept
WP7 Continuum Computing Solutions
7.3
E2CC modular platform
7.4
E2CC modular platform, V integration
7.5
Proof of concept for the Factory 4.0 use case