• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on the Safety Problem of Access Matrix Models

Research Project

Project/Area Number 13680405
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field 計算機科学
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

SOSHI Masakazu  School of Information Science, Associate Professor, 情報科学研究科, 特任助教授 (00293142)

Project Period (FY) 2001 – 2002
Project Status Completed (Fiscal Year 2002)
Budget Amount *help
¥2,000,000 (Direct Cost: ¥2,000,000)
Fiscal Year 2002: ¥1,300,000 (Direct Cost: ¥1,300,000)
Fiscal Year 2001: ¥700,000 (Direct Cost: ¥700,000)
Keywordscomputer security / access control / access matrix models / safety problem / anonymity / model / complexity theory / システム設計・解析 / 非単調システム / 決定可能性
Research Abstract

The safety problem in access matrix models is the one to determine whether or not a given subject can eventually obtain an access privilege to a given object. Generally speaking, unfortunately, the safety problem is undecidable. Little is known about protection systems for which the safety problem is decidable, except for strongly constrained systems (e.g., monotonic systems). Therefore, we propose the Dynamic-Typed Access Matrix (DTAM) Model, which extends Typed Access Matrix model of Sandhu by allowing the type of an object to change dynamically. DTAM model has an advantage that it can describe non-monotonic protection systems for which the safety problem is decidable. Especially, with further restrictions, we can show that the problem becomes NP-hard. In this research we formally define DTAM model and then discuss various aspects of it thoroughly.

Report

(3 results)
  • 2002 Annual Research Report   Final Research Report Summary
  • 2001 Annual Research Report
  • Research Products

    (16 results)

All Other

All Publications (16 results)

  • [Publications] S.Kitazawa, M.Soshi, A.Miyaji: "An Agent-Based Model of Anonymous Communication Protocols"IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprise (WETICE2001). 177-182 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] 早稲田, 双紙, 宮地: "鍵の非共有と共謀関係を考慮した共謀問題のモデル化"電子情報通信学会技術報告 ISEC. 2001-80. 9-15 (2001)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] 寺田, 多田, 宮地, 双紙: "参加者の組が所属するグループにより復元される秘密画像が異なる視覚復号型秘密分散法"暗号と情報セキュリティシンポジウム SCIS2002. 775-780 (2002)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] 刑部, 双紙, 宮地: "オブジェクト指向言語の難読化の提案"電子情報通信学会技術報告 ISEC. 33-38 (2002)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] T.Ogiso, Y.Sakabe, M.Soshi, A.Miyaji: "Software Tamper Resistance Based the Difficulty of Interprocedural Analysis"The Third International Workshop on Information Security Applications (WISA2002). 437-452 (2002)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] T.Ogiso, Y.Sakabe, M.Soshi, A.Miyaji: "Software Obfuscation on a theoretical basis and its implementation"IEICE Trans. Fundamentals. (2003)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] S. Kitazawa, M. Soshi, A. Miyaji: "An Agent-Based Model of Anonymous Communication Protocols"Sixth International Workshop on Enterprise Security, 10th IEEE International Works hops on Enabling Technologies : Infrastructure for Collaborative Enterprise. (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji: "A Collusion Model with Shared/Unshared Keys and Consideration on Collusion Relation"IEICE Japan Tech. Rep.. ISEC2001-80. 9-15 (2001)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] T. Terada, M. Tada, A. Miyaji, M. Soshi: "Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels"2002 Symposium on Cryptography and Information Security. SCIS2002-11A1. (2002)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] Yusuke SAKABE, Masakazu SOSHI, Atsuko MIYAJI: "Software Obfuscation for Object Oriented Languages"IEICE Japan Tech. Rep.. ISEC2002-6. 33-38 (2002)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji: "Software tamper resistance based on the difficulty of interprocedura 1 analysis"In The Third International Workshop on Information Security Applications (WISA 2002). 437-452 (2002)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji: "Software obfuscation on a theoretical basis and its implementation"IEICE Trans., Fundamentals. (2003)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2002 Final Research Report Summary
  • [Publications] S.Kitazawa, M.Soshi, A.Miyaji: "An Agent-Based Model of Anonymous Communication Protocols"IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprise (WETICE 2001). 177-182 (2001)

    • Related Report
      2002 Annual Research Report
  • [Publications] 早稲田, 双紙, 宮地: "鍵の非共有と共謀関係を考慮した共謀問題のモデル化"電子情報通信学会技術報告 ISEC. 2001・80. 9-15 (2001)

    • Related Report
      2002 Annual Research Report
  • [Publications] 寺田, 多田, 宮地, 双紙: "参加者の組が所属するグループにより復元される秘密画像が異なる視覚復号型秘密分散法"暗号と情報セキュリティシンポジウム SCIS2002. 775-780 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] T.Ogiso, Y.Sakabe, M.Soshi, A.Miyaji: "Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis"The Third International Workshop on Information Security Applications (WISA 2002). 437-452 (2002)

    • Related Report
      2002 Annual Research Report

URL: 

Published: 2001-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi