Summary
The first full release will provide the first coverage of regulatory compliance requirements, and include process-centric security threats and countermeasures dealing with data hiding methods during protracted operation of end-to-end data exchange scenarios. This deliverable is the result from Task 4.1 – Task 4.3.
More information & hyperlinks