Difference between revisions of "MQP:Main"
From JimboWiki
Line 14: | Line 14: | ||
*[[MQP:Security Analysis Data Structure|Security Analysis Data Model]] | *[[MQP:Security Analysis Data Structure|Security Analysis Data Model]] | ||
*[[MQP:Introduction to Netbeans Integration|Introduction to Netbeans Integration]] | *[[MQP:Introduction to Netbeans Integration|Introduction to Netbeans Integration]] | ||
− | *[[MQP: | + | *[[MQP:Rule to Resource Mapping|Rule to Resource Mapping]] |
==Proofs of Concept== | ==Proofs of Concept== |
Revision as of 17:26, 26 September 2008
This project will attempt to devise a method for determining the appropriate permission set for an application written in Java and create a developer tool implementing the method.
See the Project Overview for more.
|
Research Topics
Design Topics
- Static Analysis Strategies
- Security Analysis Data Model
- Introduction to Netbeans Integration
- Rule to Resource Mapping
Proofs of Concept
The Team
- James Cialdea - WPI Class of 2009
- Computer Science Major
- Computer Engineering Minor
- Joe Politz - WPI Class of 2009
- Computer Science Major
- Mathematics Minor
- A few WPI Advisors
- A few Sun Microsystems Project Sponsors