Nov 19, 2017

Home

Partners

People

Private

Meetings

Work Package

Documents

GForge

edit SideBar

Search

Reports

NDescriptionResp.Document
D1.2State of the art - Technological report analysing available information flow tools and their application on use cases. Indentification of underlying technological bottlenecks..TL 
D2Analysis of main weakness of information flow algorithms regarding to practical uses: proposition of adapted security policies and guidelines for MIDP programmersLIFL 
D3Expression of security policies compatible with code sharingLIFL 
D4Enrichment of information flow analysis with numerical consideration to support advanced data structuresLIF 
D5.1Information-flow analysis for a core Java sublanguage with calls to cryptographic functionsVerimag 
D5.2Information-flow analysis for a core Java sublanguage interfaced with a cryptographic APIVerimag 
D6Integration of XML access control theory and information analysis for Java to address serialazation and deserialization problemsLIF 
D8.2Evaluation of the techniques developed in the project in the context of the evaluation of mobile applicationsTL 

Others

NDescriptionTypeResp.
D0Web siteWebLIFL
D1.1Use cases - Ubiquitous applications issued from the industrial world that require security certificationSoftwareNorsys
D7“Open Source” distrubution of the prototype of Java program analyser that fill the project's objectivesSoftwareLIFL
D8.1Ubiquitous application security analyzer demonstratorDemonstratorNorsys

Page Actions

Recent Changes

Group & Page

Back Links