AccWhizz is a multilingual accounting application for small business companies and accounting offices. It is modular, written in PHP 4.x, and operates on top of PHP GroupWare. It runs as a Web application with Apache and phpgroupware serving as a middle layer. Internal data is managed by PostgreSQL/MySQL databases. The SQL server can either be local or remote.
Acceleo is a code generator designed to efficiently implement the MDA approach (Model Driven Architecture) and to improve software development productivity. It is natively integrated with Eclipse and EMF. It includes tools and editors making it easy to learn and to adapt to any kind of project or technology. It provides incremental generation, meta-model interoperability, simple and extensible syntax, template driven customization, and more.
Accept 360° is a requirements management tool with enterprise product planning and portfolio management capabilities. It provides comprehensive end-to-end support for enterprise product planning activities. The application allows for strategic planning, portfolio planning, and tactical product release planning. It unites market and customer data with portfolio, platform, and product data. Information on market segments, customers, partners, and competitors is collected and modeled in a market universe.
Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.
Access Road is a universal simulator of access controls that is intended to improve design and auditing of IT security. It provides simulations of GNU/Linux (components and rights on the file system), MySQL Server (components and privileges), and a generic Role-Based-Access-Control application. It is designed for database, system, and application administrators, IT architects and developers, and auditors. Reliability and the ability to explain the results are the main objectives. Tutorials of 80 pages are provided. A powerful framework allows new simulations to be added.