Run-time access based control -- report and prototype

Summary
Models from T4.2 will be used to detect anomalous components, which will be automatically isolated by a prototype tool. A set of fingerprint models will be created and analyzed. The usability of these fingerprints and models for automatic security controls will be tested and evaluated.The demonstration parts of software prototypes will be made available to boost replication whereas for the other parts (including source code) the consortium will identify a suitable intellectual property management strategy and misuses prevention strategy so that they will be made available as confidential annexes or disseminated to the Open Source Community.