Open Call


Announcement of the
SECURED Open Call

Announcement of the SECURED Project Open Call

We are excited to announce the Open Call for the SECURED project. The SECURED project is committed to the advancement of multiparty computation, homomorphic encryption, data anonymization, and synthetic data generation, particularly emphasizing secure and unbiased artificial intelligence and data analytics within the healthcare sector.

About the SECURED Project

The SECURED project aims to overcome current limitations in secure multiparty computation and data anonymization, enhancing their practical capabilities and performance. By addressing these challenges, SECURED will scale up privacy technologies, improve algorithmic efficiency, and support health technology providers, particularly SMEs, in implementing privacy-enhancing technologies. The project will focus on real-world applications, showcased in four health-related use cases: real-time tumor classification, telemonitoring for children, synthetic data generation for education, and access to genomic data.

Objectives of the SECURED Project

  1. Secure Multiparty Computation (SMPC) and Homomorphic Encryption (HE): Develop scalable SMPC and HE schemes for AI-based health data analytics tools suitable for realistic health domain scenarios.
  2. Advanced Anonymization: Provide advanced anonymization methods for health datasets and AI models and assess anonymity using de-anonymization/re-identification techniques.
  3. Synthetic Data Generation: Create adaptable and versatile tools and services for generating synthetic health/medical data, including synthetic images.
  4. Federated Learning Infrastructure: Establish the SECURED Privacy-Preserving and Robust Federated-Learning Infrastructure to support scalable health-data-related services and tools, ensuring unbiased AI training.
  5. Integration and Innovation Hub: Integrate SECURED components into a framework offering tools, services, training, and knowledge for researchers, EU data hubs, innovators, and end-users.
  6. Legal and Ethical Evaluation: Assess the legal and ethical aspects of cross-country usage of anonymized and synthetic datasets and AI models.
  7. Validation and Demonstration: Validate and demonstrate SECURED solutions with cross-border EU health data hubs, offering anonymized data and privacy-preserving data analysis for training and education.
  8. Dissemination and Business Model: Develop a viable dissemination, exploitation, and business model to support the continuation of a privacy-preserving collaborative health data ecosystem beyond the project’s end.

About the Open Call

The Open Call is designed to involve external third parties working on privacy-enhancing technologies and data analytics solutions in line with SECURED’s objectives. The Open Call has three main goals:

  1. Validation: Validate SECURED solutions with healthcare and data analytics stakeholders external to the consortium, using continuous feedback to refine and enhance the solutions, thus increasing the variety and volume of processed data.
  2. Collaboration: Foster ongoing collaboration with external AI/ML stakeholders, data providers, research teams, and SMEs to share and advance knowledge, enabling iterative development of solutions.
  3. Awareness and Participation: Raise awareness of SECURED’s activities through extensive outreach efforts, encouraging widespread participation by a broad community to maintain the project’s momentum beyond its completion.

Key Activities and Support

The Open Call tasks will involve:

  • Executing the evaluation of Open Call applications.
  • Providing guidelines, recommendations, and technical details for the Open Call.
  • Designing the legal and contractual aspects.
  • Realizing the Open Call and reporting based on consortium templates/guidelines.
  • Holding at least two meetings between the consortium and external parties to set up requirements and present findings.

Funding and Meetings

A dedicated budget of €150,000 has been reserved to fund the selected external parties, compensate external evaluators to ensure a thorough and collaborative evaluation process, and organize one final showcase meeting in an outreach event of the project. Following the Horizon Europe requirements for financial support to third parties, the selected external parties will be funded up to €26,000 each for the project with an additional €1,500 for travel costs. This will assist in the wider evaluation and acceptance of SECURED solutions in the EU data-driven health research and innovation ecosystem.

Funding

Details of the SECURED Open Call for proposals are as follows:

Total allocated budget: 150,000 euros

Maximum funding per project: 26,000 euros + 1,500 euros for travel costs to the final event

Timeline

Call for proposals launch: 1/8/2024

Proposal submission deadline: 31/10/2024, 17:00 CET

Notification of selected projects: 30/11/2024

Project implementation period: 1/12/2024-1/5/2025

Completion of works: 1/5/2025

We welcome proposals from individuals, organizations, and groups who are passionate about making a positive impact in reliable and unbiased AI and data analytics in the healthcare industry. Proposals will be evaluated based on their creativity, feasibility, impact, and alignment with our organization’s mission.

Stay tuned for more details on the SECURED Open Call and join us in advancing secure and private healthcare data analytics: you can subscribe to the news mailing list by entering your name and e-mail in this link: https://list.uva.nl/mailman/listinfo/news-secured-open-call. Together, we can make significant strides in privacy-preserving technologies for the well-being, diagnosis, treatment and follow-up care in healthcare.

For further information, please contact us via our Open Call email: secured-open-call@list.uva.nl.

Call for proposals launch: 1/8/2024

Proposal submission deadline: 31/10/2024, 17:00 CET

Open Call FAQ

The primary goal is to validate the SECURED solutions with real-world healthcare and AI stakeholders, ensuring that our privacy-preserving AI technologies are effective, scalable, and legally compliant.

The SECURED Open Call is open to individuals, researchers and SME’s, organizations and groups working in Al and healthcare. Selected projects can receive up to €26,000 in funding, plus €1,500 for travel to the final event. Eligibility for participation in this Open Call is extended to participants (individuals and organizations) from countries listed as eligible for Horizon 2020, as defined in the “EU Grants: List of participating countries (HE): V3.1 – 11.07.2024: List of Participating Countries in Horizon Europe. For a complete and up-to-date list, participants are encouraged to refer to the Horizon Europe Programme Guide. https://ec.europa.eu/info/funding-tenders/opportunities/docs/2021- 2027/common/guidance/list-3rd-country-participation_horizon-euratom_en.pdf

The SECURED Open Call focuses on several key areas, including:

    • Privacy-preserving AI, particularly in healthcare
    • Secure multiparty computation (SMPC)
    • Homomorphic encryption and data anonymization
    • Synthetic data generation and federated learning

Participants must be individuals, organizations, or groups working in AI, data analytics, or healthcare. The project must align with SECURED’s mission of advancing privacy-preserving AI technologies, particularly in the healthcare sector.

Applications will be evaluated based on the following criteria:

    • Alignment with SECURED’s mission: Does the project address privacy-enhancing AI in healthcare?
    • Innovation: Does the project bring novel or creative approaches?
    • Feasibility: Is the project practical and achievable within the timeline?
    • Impact: Will the project make a significant contribution to privacy-preserving AI?

Participants will receive technical guidance, templates, and direct support from the SECURED team. Additionally, there will be opportunities to collaborate with consortium members and two key meetings to refine project ideas.

Selected projects can receive up to €26,000 for project development, along with an additional €1,500 for travel to the final event. This funding supports project implementation and participation in the SECURED innovation ecosystem.

    • Call launch: August 1, 2024
    • Proposal submission deadline: October 31, 2024
    • Notification of selection: November 30, 2024
    • Project implementation: December 1, 2024, to May 1, 2025

Participants will receive:

    • Funding and resources to support the development of privacy-preserving AI solutions
    • Visibility through opportunities to present innovations at the Final Showcase Workshop
    • Networking with leading experts in AI privacy technologies and the healthcare industry.

The projects should demonstrate practical applications of privacy-preserving AI technologies, particularly in real-world healthcare settings. Participants are also expected to contribute to the long-term development of a privacy-preserving health data ecosystem

Each project will undergo a thorough legal and ethical evaluation to ensure that cross-country regulations regarding anonymized data are fully adhered to. Legal compliance is a key requirement for project validation

Proposals must be submitted via the SECURED Open Call portal on the SECURED project website. Submissions must include a comprehensive project plan detailing how the privacy-enhancing technologies will be applied in real-world healthcare scenarios.

Applicants need to submit:

  1. Proposal form (PDF format)
  2. Project description
  3. Budget and cost breakdown
  4. Ethics and security considerations. A Declaration of Honour must also be signed and submitted to affirm compliance with the Open Call’s rules.

Yes, participants can only submit up to two proposals, but only one can be accepted for funding. Additionally, individuals or entities with conflicts of interest related to the SECURED project are not eligible to apply.

The Open Call will fund projects that implement and test privacy-enhancing technologies in healthcare. These include:

  • Secure Multiparty Computation (SMPC)
  • Homomorphic Encryption (HE)
  • Advanced Anonymization (AA)
  • Synthetic Data Generation (SDG) The projects should validate these technologies in real-world healthcare scenarios

The evaluation will take place in two stages:

  1. Eligibility check: Ensures the proposal meets basic eligibility criteria (e.g., submission before the deadline, from eligible countries, alignment with SECURED objectives).
  2. External expert evaluation: Independent experts will score the proposal based on criteria such as alignment with SECURED’s mission, innovation, feasibility, impact and resources.

Projects must address ethical and security considerations, especially since they deal with sensitive healthcare data. Key areas include:

  • Compliance with GDPR: All projects must follow the General Data Protection Regulation (GDPR) for data handling.
  • Ethical self-assessment: Applicants must identify potential ethical issues and submit an ethics self-assessment. This could include securing ethics committee approval and ensuring appropriate consent procedures for data collection and analysis​.

All funded projects are required to present their results at the final SECURED showcase event. This event will include representatives from the SECURED consortium, external evaluators and other relevant stakeholders. The goal is to demonstrate the successful implementation of privacy-enhancing technologies in healthcare.

If a proposal is not selected for immediate funding but meets the eligibility and evaluation criteria, it may be placed on a reserve list. Proposals on this list may be reconsidered for funding if other projects fail to proceed​.

Both individuals and organizations (e.g., SMEs, academic institutions) can apply. However, individual applications must meet specific requirements, and certain roles (e.g., project coordinator) are restricted to organizations due to the administrative and financial responsibilities involved​.

Funding is released in three stages, based on achieving milestones:

  • Planning phase (30%): Payment after submitting and approving the detailed project plan.
  • Implementation phase (40%): Payment after successful execution and a mid-term review.
  • Evaluation and reporting phase (30%): Payment after the final report submission and participation in the showcase event​

A consortium is a group of partners collaborating on a project. In consortium-based applications, one partner acts as the coordinator, ensuring compliance with all legal, reporting and financial obligations. A strong consortium should include experts from different fields, ensuring a diverse skill set to meet the project’s objectives​.

The main sections of the proposal (excluding the cover page and specific sections like the ethics review) must not exceed 10 pages. The minimum font size is 11 points, and all proposals should follow the guidelines provided in the template to ensure completeness and readability.

Incomplete proposals or those submitted after the deadline (31 October 2024, 17:00 CET) will not be considered for evaluation. Proposals must meet all submission requirements, including the format, required fields and documentation.

Yes, you can submit up to two proposals. However, only one proposal will be eligible for funding if both are evaluated positively​.

After the submission deadline on 31 October 2024, proposals will be evaluated, and applicants will be notified by 30 November 2024. Selected projects will then move forward to the contract preparation and negotiation phase​.

During the project lifecycle, participants will be required to submit:

  • Project Plan: A detailed plan outlining the scope of the project, timeline, and resource allocation (due after the Planning phase).
  • Mid-term Progress Report: A report outlining the progress made during the Implementation phase, including challenges faced and any adjustments to the plan.
  • Final Report: A comprehensive report that documents the project outcomes, technical evaluations, and the impact on privacy-preserving AI in healthcare​.

While there is no strict requirement on the number of team members, the proposal should include a well-structured and capable team with expertise aligned to the project’s goals. The consortium must demonstrate that it has the capacity to execute the proposed work​.

Participants are encouraged to communicate any significant challenges or delays to the SECURED project management. The mid-term review provides an opportunity to address challenges with the SECURED consortium and to receive technical or administrative support​.

The Declaration of Honour confirms that the applicant complies with the SECURED Open Call’s rules, including eligibility criteria, absence of conflicts of interest and commitment to fulfilling the obligations of the project. It must be signed by the legal representative of the applicant entity​.

Each project will have three key milestones that coincide with the funding stages:

  • Planning Phase (1 month): Submission and approval of the detailed project plan.
  • Implementation Phase (3 months): Progress review and mid-term report submission.
  • Evaluation and Reporting Phase (1 month): Final report submission and participation in the final showcase​.

The budget should clearly outline the costs required for personnel, technology, and other resources necessary for the project’s completion. The breakdown must align with the project’s scope and timeline. The maximum funding per project is €26,000, with an additional €1,500 for travel expenses.

Selected participants will be required to sign a sub-grant agreement with the SECURED consortium. This agreement details the obligations, including adherence to the project timelines, reporting requirements, financial responsibilities and compliance with legal and ethical guidelines​.

The applicants will retain ownership of any intellectual property generated during the project. However, the SECURED consortium may request access to project outcomes for further development of the SECURED tools and for dissemination purposes. Participants must acknowledge SECURED and the EU in their outputs, and open-source licensing is encouraged, although not mandatory​.

Your proposal should clearly outline how SECURED technologies, such as SMPC, HE, AA, and SDG, will be integrated into your healthcare data analytics solution. This involves addressing the technical challenges your project will face and demonstrating how the SECURED services will be used to overcome these​.

GDPR compliance is essential for any project involving personal data. Participants must ensure that all personal data is processed lawfully and securely, and that proper consent and data protection measures are in place. The project must also include privacy safeguards and risk mitigation plans.

Detailed technical integration is not required at the application stage. Instead, the proposal should outline how SECURED technologies—such as Secure Multiparty Computation (SMPC), Homomorphic Encryption (HE), Anonymization (AA), and Synthetic Data Generation (SDG)—will be incorporated within your healthcare data analytics solution. Focus on the high-level technical challenges and how SECURED services will be applied to address these, rather than providing exhaustive technical specifications.

The technical information is provided only to Open Call participants, so no additional documents are publicly available for download beyond Annex 2. However, using the information in the FAQs and Annex 2, your proposal should emphasize conceptual alignment with SECURED’s privacy-preserving goals and illustrate the anticipated use of their services to address relevant challenges.

Your proposal should clearly state how SECURED technologies will be applied to overcome the technical challenges faced in your healthcare data analytics solution. Focus on the conceptual approach to privacy-preserving data handling, specifically addressing how these SECURED services will help achieve these objectives, while recognizing potential integration challenges.

Applicants may choose multiple SECURED services (e.g., both SMPC and HE) but must specify one as the primary focus of the proposal. The primary service should receive the most attention, detailing its anticipated use in alignment with your project’s goals. Secondary services can be mentioned briefly to illustrate their complementary role without requiring an in-depth technical description for each.

No, only the primary SECURED service requires a detailed focus. Secondary services can be mentioned to show how they may complement the main technology, but an exhaustive focus on each service is unnecessary.

For additional inquiries, please contact us through the following channels:

Scroll to Top