Go down

Methodology Empty Methodology

Post  Admin on Tue May 10, 2011 3:52 pm

Overall objectives
In the context of the SecureCHAINS project, a Technology tree is defined as a hierarchical diagram which breaks a Security solution down into its contributory elements, starting at capability level and working down through sub-systems to underlying technologies.
Although not constituting a comprehensive dataset in all areas of capability, the Technology Trees will provide some useful insights about the STSC and the contributions that different players make. They will alos be used to identify opportunities and weak spots in the supply chains. Another objective of the technology tree assessments is to explore their applicability in defence and security sector.

Identification of Technology Trees
Security has broad strategic implications, encompassing several fields:
• defence (security of supply, maritime surveillance and border control)
• energy (supplies, control of production, infrastructure and distribution)
• transport (maritime transport, port and airport security)
• civil protection (space earth monitoring, situational awareness, crisis management)

When doing the exercise of building Technology Trees for these domains we have found that mapping technology trees for such a big a range of security solutions is a very ambitious task since nearly all the TIC technologies can be inserted in this area.

A data gathering effort of this magnitude is beyond the scope of this study and would necessitate a considerable larger research team and effort. To face this problem a new strategy has been defined based on the following general guidelines:
1. Create some Global technology trees, in which security tasks and security capabilities to support them will be shown.
2. Select some leaf nodes (capabilities) from these global technology trees and keep on with the arborisation, creating Detailed technology trees that show technologies and main players in the STSC.

The starting point for the identification of the security solutions for the Global TTs has been the topics of the FP7 program Security Call . We have developed one Global TT for each of these Missions, according to the work produced in the ESRAB and the ESRIF reports. Some key industrial partners involved in the FP7 Security workprogrammes have been looked up to achieve this task.

The leaf nodes of the Global TTs are the so-called Security Capabilities. A Capability represents the smallest complete assembly of technologies and processes that together allow to perform a specific security function. In fact capabilities are a fussion of mission-specific and multi-mission nodes that combine technology solutions to varying degrees of range, depth and application.

Among all the capabilities depicted in the Global TTs, we have identified some of them to be further extended in their corresponding Detailed TTs. As a result, several Detailed TT have been created and the main technology suppliers have been identified. The identification of the detailed TTs has been based on tree aspects:
• The involved tecnologies can be applicable in most of the Security domains.
• The assigments defined by the SecureCHAINS partners for the EBB board composition.
• The dual-use of the technologies in both the Security and Defense sectors


Posts : 107
Join date : 2010-10-19

View user profile

Back to top Go down

Back to top

Permissions in this forum:
You cannot reply to topics in this forum