• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

FORMAL VERIFICATION METHOD OF ACTIVE SOFTWARE

Research Project

Project/Area Number 16500019
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Software
Research InstitutionNARA INSTITUTE OF SCIENCE AND TECHNOLOGY

Principal Investigator

SEKI Hiroyuki  NARA INSTITUTE OF SCIENCE AND TECHNOLOGY, GRADUATE SCHOOL OF INFORAMTION SCIENCE, PROFESSOR, 情報科学研究科, 教授 (80196948)

Co-Investigator(Kenkyū-buntansha) TAKATA Yoshiaki  NARA INSTITUTE OF SCIENCE AND TECHNOLOGY, GRADUATE SCHOOL OF INFORAMTION SCIENCE, ASSISTANT PROFESSOR, 情報科学研究科, 助手 (60294279)
Project Period (FY) 2004 – 2005
Project Status Completed (Fiscal Year 2005)
Budget Amount *help
¥3,400,000 (Direct Cost: ¥3,400,000)
Fiscal Year 2005: ¥1,700,000 (Direct Cost: ¥1,700,000)
Fiscal Year 2004: ¥1,700,000 (Direct Cost: ¥1,700,000)
KeywordsFORMAL VERIFICATION / MODEL CHECKING / ACITVE SOFTWARE / ACCESS CONTROL / STATIC ANALYSIS / EXECUTION HISTORY / FORMAL LANGUAGE / SECURITY POLICY
Research Abstract

(1)A formal model of programs with access control based on execution history and its model checking : We defined a formal model called HBAC programs. The verification problem for HBAC programs was defined and shown to be EXPTIME-complete, while the problem is solvable in polynomial time under a reasonable assumption. The proposed method reduces the verification problem to the decision problem for a context-free grammar (cfg) that generates all the execution sequences of a given HBAC program. We also proposed a few optimization techniques that reduce the number of cfg rules useless for generating execution sequences. Experimental results showed that the verification tool we have implemented can verify practical HBAC programs within a reasonable time.
(2)A static analysis using tree automata for XML access control : We proposed a static analysis method based on tree automata for determining whether a query to an XML database does not access any elements nor attributes that are prohibited by a given policy. We showed that our query model is sufficiently general by showing that the expressive power of our model is strictly greater than Neven's query automata. We also investigated a consistency problem of policies in schema transformation of XML databases and showed that the problem is decidable.
(3)A formal model for stateful trust management systems : We proposed a trust management model that can represent a system with internal states. The verification problem was defined as the problem to decide whether the behavior of a system with a given policy satisfies a given verification property, and a verification method for the problem was also proposed. We implemented two verification tools, one is based on SPIN and Prolog and the other is implemented by Prolog only. Experimental results showed that the latter tool is more efficient than the former one.

Report

(3 results)
  • 2005 Annual Research Report   Final Research Report Summary
  • 2004 Annual Research Report
  • Research Products

    (23 results)

All 2006 2005

All Journal Article (23 results)

  • [Journal Article] 実行履歴に基づくアクセス制御付き再帰プログラムのモデル検査2006

    • Author(s)
      王静, 他
    • Journal Title

      日本ソフトウェア科学会第8回プログラミングおよびプログラミング言語ワークショップ論文集

      Pages: 183-183

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2006

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      Computer Software (to appear)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2006

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      コンピュータソフトウェア (印刷中)

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A Formal Model for Access Control Based on Execution History2005

    • Author(s)
      Hiroyuki Seki, et al.
    • Journal Title

      第4回クリティカル・ソフトウェアワークショップ予稿集

      Pages: 63-67

    • NAID

      10015556971

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] XMLアクセス制御における木オーとマンを用いた静的検査2005

    • Author(s)
      八木 勲, 他
    • Journal Title

      日本ソフトウェア科学会第7回プログラミングおよびプログラミン言語ワークショップ論文集

      Pages: 43-43

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A formal Model for Access Control based on Execution History2005

    • Author(s)
      Jing Wang, et al.
    • Journal Title

      電子情報通信学会技術研究報告 SS2004-63

      Pages: 43-48

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      電子情報通信学会技術研究報告 SS2005-18

      Pages: 1-6

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] A Formal Model for Stateful Trust Management Systems2005

    • Author(s)
      Hisashi Mouri, et al.
    • Journal Title

      電子情報通信学会技術研究報告 SS2005-20

      Pages: 13-18

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      3^rd Int' 1 Symp on Automated Technology for Verification and Analysis, Lecture Notes in Computer Science 3707

      Pages: 234-247

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Formal Model for Stateful Trust Management Systems2005

    • Author(s)
      Hisashi Mouri, et al.
    • Journal Title

      IASTED International Conference on Software Engineering and Applications 467-030

      Pages: 87-92

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      コンピュータソフトウェア 印刷中

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Formal Model for Access Control Based on Execution History2005

    • Author(s)
      H.Seki, et al.
    • Journal Title

      4^<th> Workshop of Critical Software

      Pages: 63-67

    • NAID

      10015556971

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Y.Isao, et al.
    • Journal Title

      The 7^<th> JSSST Workshop on Programming and Programming Languages

      Pages: 43-43

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Formal Model for Access Control Based on Execution History2005

    • Author(s)
      Jing Wang, et al.
    • Journal Title

      Technical Report of IEICE SS2004-63

      Pages: 43-48

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      Technical Report of IEICE SS2005-18

      Pages: 1-6

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Formal Model for Stateful Trust Management Systems2005

    • Author(s)
      Hisashi Mouri, et al.
    • Journal Title

      Technical Report of IEICE SS2005-20

      Pages: 13-18

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      3^<rd> Int'l Symp. on Automated Technology for Verification and Analysis, Lecture Notes in Computer Science 3707

      Pages: 234-247

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Model Checking Programs with Access Control Based on Execution History2005

    • Author(s)
      Jing Wang, et al.
    • Journal Title

      The 8^<th> JSSST Workshop on Programming and Programming Languages

      Pages: 183-183

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Static Analysis using Tree Automata for XML Access Control2005

    • Author(s)
      Isao Yagi, et al.
    • Journal Title

      3^<rd> Int' 1 Symp.on Automated Technology for Verification and Analysis, Lecture Notes in Computer Science 3707

      Pages: 234-247

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Policy Controlled System and Its Model Checking2005

    • Author(s)
      S.Kuninobu, et al.
    • Journal Title

      IEICE Transactions on Information and Systems E88-D(印刷中)

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A Formal Model for Access Control Based on Execution History2005

    • Author(s)
      H.Seki, et al.
    • Journal Title

      第4回クリティカル・ソフトウェアワークショップ予稿集

      Pages: 63-67

    • NAID

      10015556971

    • Related Report
      2004 Annual Research Report
  • [Journal Article] XMLアクセス制御における木オートマトンを用いた静的検査2005

    • Author(s)
      八木 勲, 他
    • Journal Title

      日本ソフトウェア科学会第7回プログラミングおよびプログラミング言語ワークショップ論文集

      Pages: 43-43

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A Formal Model for Access Control Based on Execution History2005

    • Author(s)
      Jing Wang, et al.
    • Journal Title

      電子情報通信学会技術研究報告 SS2004-63

      Pages: 43-48

    • Related Report
      2004 Annual Research Report

URL: 

Published: 2004-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi