• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

STUDY ONAUTOMATIC VERIFICATION OF HIGHLY RELIABLE SOFTWARE BYINFINITE STATE MODEL CHECKING

Research Project

Project/Area Number 18500023
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Software
Research InstitutionNara Institute of Science and Technology

Principal Investigator

SEKI Hiroyuki  Nara Institute of Science and Technology, GRADUATE SCHOOL OF INFORMATION SCIENCE, PROFESSOR (80196948)

Co-Investigator(Kenkyū-buntansha) TAKATA Yoshiaki  KOCHI UNIVERSITY OF TECHNOLOGY, FACULTY OF ENGINEEIG, ASSISTANT PROFESSOR (60294279)
Project Period (FY) 2006 – 2007
Project Status Completed (Fiscal Year 2007)
Budget Amount *help
¥3,880,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥480,000)
Fiscal Year 2007: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Fiscal Year 2006: ¥1,800,000 (Direct Cost: ¥1,800,000)
KeywordsFORMAL VERIFICATION / MODEL CHECKING / STATIC ANALYSIS / FORMAL LANGUAGE / ACCESS CONTROL / SECURITY / EXECUTION HISTORY / XML / ソフトウェア学
Research Abstract

(1) Model Checking Methods for Recursive Programs: We defined a formal model for programs with access control based on execution history, called HBAC programs and showed that the verification problem for HBAC programs is solvable in polynomial time under a practical assumption. We also proposed a few optimization techniques based on the elimination of useless rules of context-free grammar (CFG). We conducted verifications of two examples, namely, Chinese wall policy and an online banking system, using our implemented verification tool. The verification time for the former problem was 64 seconds when the number of permissions was eighty, and the verification time for the latter problem was 0.01 second when the number of permissions was sixty.
(2) Information Flow Analysis: A new information flow analysis method for HBAC programs was proposed. Using the method, we can verify a property of information flow extended to execution paths. Also, we extended a self-composition method so that recursive programs can be analysed.
(3) Expressive Power of History-based Access Control: We clarified the relation among the expressive powers of various access control models based on execution history.
(4) A Formal Model of Aspect-Oriented Program: A formal model called A-LTS for a pointcut and advice was defined and it was shown that the languages accepted by A-LTSs, deterministic context-free languages (CFLs) and linear CFLs are pairwise incomparable.
(5) Other research results.
(a) A new class of tree automata called TAN was defined by incorporating a rewrite system modulo equational theory into a standard tree automaton, and discussed the decidability of the fundamental problems of TAN.
(b) Computational complexity of the disclosure tree strategy (DTS) in trust negotiation was clarified and an efficient algorithm was also proposed under practical conditions.
(c) We proposed a secondary structure prediction method for interacting RNA based on a parsing algorithm for multiple CFG.

Report

(3 results)
  • 2007 Annual Research Report   Final Research Report Summary
  • 2006 Annual Research Report
  • Research Products

    (35 results)

All 2008 2007 2006 Other

All Journal Article (21 results) (of which Peer Reviewed: 10 results) Presentation (14 results)

  • [Journal Article] 実行履歴に基づくアクセス制御の形式モデルと検証2008

    • Author(s)
      高田喜朗、王静、関浩之
    • Journal Title

      電子情報通信学会論文誌D J91-D(4)

      Pages: 847-858

    • NAID

      110007381033

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] A Formal Model and Its Verification of History-based Access Control2008

    • Author(s)
      Yoshiaki, Takata, Jing, Wang, Hiroyuki, Seki
    • Journal Title

      IEICE Transactions on Information and Systems J91-D(4)

      Pages: 847-858

    • NAID

      110007381033

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] 実行履歴に基づくアクセス制御の形式モデルと検証2008

    • Author(s)
      高田喜朗, 王静, 関浩之
    • Journal Title

      電子情報通信学会論文誌D J91-D(4)

      Pages: 847-858

    • NAID

      110007381033

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Labeled Transition Model A-LTS for History-based Aspect Weaving and Its Expressive Power2007

    • Author(s)
      Isao Yagi, Yoshiaki Takata and Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information and Systems E90-D(5)

      Pages: 799-807

    • NAID

      110007519523

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] Languages Modulo Normalization2007

    • Author(s)
      Hitoshi Ohsaki and Hiroyuki Seki
    • Journal Title

      Lecture Notes in Artificial Intelligence (FroCos07) 4720

      Pages: 221-236

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] Computational Complexity of the Disclosure Tree Strategy in Trust Negotiation2007

    • Author(s)
      Yoshiaki Takata and Hiroyuki Seki
    • Journal Title

      2007 International Conference on Next Era Information Networking (NEINE07)

      Pages: 323-328

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] A Grammatical Approach to RNA-RNA Interaction Prediction2007

    • Author(s)
      Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki
    • Journal Title

      2007 International Symposium on Computational Models for Life Sciences (CMLS'07)

      Pages: 197-206

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] A Labeled Transition Model A-LTS for History-based Aspect Weaving and Its Expressive Power2007

    • Author(s)
      Isao, Yagi, Yoshiaki, Takata, Hiroyuki, Seki
    • Journal Title

      MICE Transactions on Information and Systems E90-D(5)

      Pages: 799-807

    • NAID

      110007519523

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] Languages Modulo Normalization2007

    • Author(s)
      Hitoshi, Ohsaki, Hiroyuki, Seki
    • Journal Title

      Lecture Notes in Artificial Intelligence(FroCos07) 4720

      Pages: 221-236

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] Computational Complexity of the Disclosure Tree Strategy in Trust Negotiation2007

    • Author(s)
      Yoshiaki, Takata, Hiroyuki, Seki
    • Journal Title

      2007 International Conference on Next Em Information Networking(NEINE07)

      Pages: 323-328

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] A Grammatical Approach to RNA-RNA Interaction Prediction2007

    • Author(s)
      Yuki, Kato, Tatsuya, Akutsu, Hiroyuki, Seki
    • Journal Title

      2007 International Symposium on Computational Models for Life Sciences(CMLS'07)

      Pages: 197-206

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] Languages Modulo Normalization2007

    • Author(s)
      Hitoshi Ohsaki and Hiroyuki Seki
    • Journal Title

      Lecture Notes in Artificial Intelligence(FroCos07) 4720

      Pages: 221-236

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Computational Complexity of the Disclosure Tree Strategy in Trust Negotiation2007

    • Author(s)
      Yoshiaki Takata and Hiroyuki Seki
    • Journal Title

      2007 International Conference on Next Era Information Networking(NEINE07)

      Pages: 323-328

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Grammatical Approach to RNA-RNA Interaction Prediction2007

    • Author(s)
      Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki
    • Journal Title

      2007 International Symposium on Computational Models for Life Sciences(CMLS'07)

      Pages: 197-206

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 実行履歴に基づくアクセス制御付きプログラムのモデル検査法による情報フロー解析2007

    • Author(s)
      王, 伊藤, 高田, 関
    • Journal Title

      電子情報通信学会技術研究報告 SS2006-72

      Pages: 7-12

    • NAID

      110006239524

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 実行履歴に基づくアクセス制御モデルの表現能力の比較2007

    • Author(s)
      王, 高田, 関
    • Journal Title

      日本ソフトウェア科学会第9回プログラミングおよびプログラミング言語ワークショップ論文集

      Pages: 90-90

    • Related Report
      2006 Annual Research Report
  • [Journal Article] HBACプログラムのモデル検査の情報フロー解析への応用2007

    • Author(s)
      王, 伊藤, 高田, 関
    • Journal Title

      電子情報通信学会2007年総合大会 D-3-1 (CD-ROM)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A Labeled Transition Model A-LTS for Histroy-based Aspect Weaving and Its Expressive Power2007

    • Author(s)
      Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information and Systems E90-D(5) (印刷中)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] HBAC: A Model for History-based Access Control and Its Model Checking2006

    • Author(s)
      Jing Wang, Yoshiaki Takata and Hiroyuki Seki
    • Journal Title

      Lecture Notes in Computer Science (11th European Symposium On Research In Computer Security) 4189

      Pages: 263-278

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
    • Peer Reviewed
  • [Journal Article] HBAC: A Model for History-based Access Control and Its Model Checking2006

    • Author(s)
      Jing, Wang, Yoshiaki, Takata, Hiroyuki, Seki
    • Journal Title

      Lecture Notes in Computer Science(11th European Symposium On Research In Computer Security 4189

      Pages: 263-278

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Journal Article] HBAC : A Model for History-based Access Control and Its Model Checking2006

    • Author(s)
      Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    • Journal Title

      11th European Symposium on Research In Computer Security, Lecture Notes in Computer Science 4189

      Pages: 263-278

    • Related Report
      2006 Annual Research Report
  • [Presentation] 自己合成法を利用した再帰プログラムの情報流解析について2008

    • Author(s)
      伊藤信裕, 関浩之
    • Organizer
      電子情報通信学会技術研究報告SS2007-62
    • Place of Presentation
      長崎
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Annual Research Report 2007 Final Research Report Summary
  • [Presentation] 実行履歴に基づくアクセス制御付きプログラムのモデル検査法による情報フロー解析2007

    • Author(s)
      王静, 伊藤信裕, 高田喜朗, 関浩之
    • Organizer
      電子情報通信学会技術研究報告SS2006-72
    • Place of Presentation
      名古屋
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] 実行履歴に基づくアクセス制御モデルの表現能力の比較2007

    • Author(s)
      王静, 高田喜朗, 関浩之
    • Organizer
      日本ソフトウェア科学会第9回プログラミングおよびプログラミング言語ワークショップ
    • Place of Presentation
      加賀
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] HBACプログラムのモデル検査の情報フロー解析への応用2007

    • Author(s)
      王静, 伊藤信裕, 高田喜朗, 関浩之
    • Organizer
      電子情報通信学会2007年総合大会D-3-1
    • Place of Presentation
      東京
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] モデル検査によるHBACプログラムの情報流解析2007

    • Author(s)
      高田喜朗, 関浩之
    • Organizer
      日本ソフトウェア科学会第5回ディペンダブルシステムワークショップ
    • Place of Presentation
      函館
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Annual Research Report 2007 Final Research Report Summary
  • [Presentation] Comparison of the Expressive Power of Language-based Access Control Models2007

    • Author(s)
      Hiroyuki Seki and Yoshiaki Takata
    • Organizer
      日本ソフトウェア科学会第5回ディペンダブルシステムワークショップ
    • Place of Presentation
      函館
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Annual Research Report 2007 Final Research Report Summary
  • [Presentation] Information Flow Analysis Using Model Checking for Programs with History-based Access Control2007

    • Author(s)
      Jing, Wang, Nobuhiro, Ito, Yoshiaki, Takata, Hiroyuki, Seki
    • Organizer
      Technical Report of IEICE, SS2006-72
    • Place of Presentation
      Nagoya
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] On Comparison of the Expressive Power of Access Control Models Based on Execution History2007

    • Author(s)
      Jing, Wang, Yoshiaki, Takata, Hiroyuki, Seki
    • Organizer
      The 9th JSSST Workshop on Programming and Programming Languages
    • Place of Presentation
      Kaga
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] An Application of HBAC Model Checking to Information Flow Analysis2007

    • Author(s)
      Jing, Wang, Nobuhiro, Ito, Yoshiaki, Takata, Hiroyuki, Seki
    • Organizer
      IEICE General Conference
    • Place of Presentation
      Tokyo
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] On Information Flow Analysis for Recursive Programs Based on Self-Composition2007

    • Author(s)
      Nobuhiro, Ito, Hiroyuki, Seki
    • Organizer
      Technical Report of IEICE, SS2007-62
    • Place of Presentation
      Nagasaki
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] An Efficient Model Checking Method for Programs with History-based Access Control2006

    • Author(s)
      Jing Wang, Yoshiaki Takata and Hiroyuki Seki
    • Organizer
      電子情報通信学会技術研究報告SS2006-38
    • Place of Presentation
      札幌
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] An Efficient Model Checking Method for Programs with History-based Access Control2006

    • Author(s)
      Jing, Wang, Yoshiaki, Takata, Hiroyuki, Seki
    • Organizer
      Technical Report of IEICE, SS2006-38
    • Place of Presentation
      Sapporo
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] Information Flow Analysis of HBAC Programs Using Model Checking

    • Author(s)
      Yoshiaki, Takata, Hiroyuki, Seki
    • Organizer
      The 5th JSSST Dependable System Workshop
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary
  • [Presentation] Comparison of the Expressive Power of Language-based Access Control Models

    • Author(s)
      Hiroyuki, Seki, Yoshiaki, Takata
    • Organizer
      The 5th JSSST Dependable System Workshop
    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2007 Final Research Report Summary

URL: 

Published: 2006-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi