N | Description | Resp. | Document |
D1.2 | State of the art - Technological report analysing available information flow tools and their application on use cases. Indentification of underlying technological bottlenecks.. | TL | |
D2 | Analysis of main weakness of information flow algorithms regarding to practical uses: proposition of adapted security policies and guidelines for MIDP programmers | LIFL | |
D3 | Expression of security policies compatible with code sharing | LIFL | |
D4 | Enrichment of information flow analysis with numerical consideration to support advanced data structures | LIF | |
D5.1 | Information-flow analysis for a core Java sublanguage with calls to cryptographic functions | Verimag | |
D5.2 | Information-flow analysis for a core Java sublanguage interfaced with a cryptographic API | Verimag | |
D6 | Integration of XML access control theory and information analysis for Java to address serialazation and deserialization problems | LIF | |
D8.2 | Evaluation of the techniques developed in the project in the context of the evaluation of mobile applications | TL | |