This research activity defines a methodological approach to systems security in terms of inherently secure applications development as well as mechanisms that evaluate and monitor a minimum required security level. The research activities in this area are:

  • Avoid interception of a communication from malicious parties. This can be addressed by cryptographic mechanisms based on digital signature;
  • Assure data confidentiality within complex databases;
  • Monitoring system for external as well as internal attacks.

Results from those activities should converge in software libraries that can be reused for the development of highly secure applications.