This research activity defines a methodological approach to systems security in terms of inherently secure applications development as well as mechanisms that evaluate and monitor a minimum required security level. The research activities in this area are:
- Avoid interception of a communication from malicious parties. This can be addressed by cryptographic mechanisms based on digital signature;
- Assure data confidentiality within complex databases;
- Monitoring system for external as well as internal attacks.
Results from those activities should converge in software libraries that can be reused for the development of highly secure applications.