• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Secure System Design based on Multi-view

Research Project

Project/Area Number 20700036
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Software
Research InstitutionNational Institute of Informatics

Principal Investigator

YOSHIOKA Nobukazu  National Institute of Informatics, アーキテクチャ科学研究系, 准教授 (20390601)

Co-Investigator(Renkei-kenkyūsha) WASHIZAKI Hironori  早稲田大学, 理工学術院, 准教授 (70350494)
Project Period (FY) 2008 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2010: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2009: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2008: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Keywordsセキュリティ / 設計手法 / 関心毎の分離 / パターン / 分散システム
Research Abstract

In this research, we have proposed a three view modeling method with an attack model, a threat model and security model to design secure system in addition to usual design model. The multi-view modeling allows us to separate security concerns into an integrated design method and to design secure systems step-by-step.

Report

(4 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (18 results)

All 2010 2009 2008 Other

All Journal Article (10 results) (of which Peer Reviewed: 6 results) Presentation (7 results) Remarks (1 results)

  • [Journal Article] Misuse cases +Assets + Security Goals2009

    • Author(s)
      Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka
    • Journal Title

      Proc.of Workshop on Software Security Process (SSP09), IEEE

      Pages: 424-429

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] パターン間の関係を考慮したセキュリティパターン適用支援2009

    • Author(s)
      城間祐輝, 久保淳人, 吉岡信和, 鷲崎弘宜, 深澤良彰
    • Journal Title

      ソフトウェアエンジニアリング最前線2009

      Pages: 75-82

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] SQUAREではじめるセキュリティ要求工学2009

    • Author(s)
      Nancy R.Mead, 吉岡信和
    • Journal Title

      情報処理 Vbl.50, No.3

      Pages: 193-197

    • Related Report
      2010 Final Research Report
  • [Journal Article] セキュリティ要求工学の概要と展望2009

    • Author(s)
      吉岡信和、Bashar Nuseibeh
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 187-192

    • Related Report
      2010 Final Research Report
  • [Journal Article] パターン間の関係を考慮したセキュリティパターン適用支援2009

    • Author(s)
      城間祐輝, 久保淳人, 吉岡信和, 鷲崎弘宜, 深澤良彰
    • Journal Title

      ソフトウェアエンジニアリング最前線 2009

      Pages: 75-82

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Misuse cases+Assets+Security Goals2009

    • Author(s)
      Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka
    • Journal Title

      Proc.of Workshop on Software Security Process(SSP09), IEEE

      Pages: 424-429

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] セキュリティ要求工学の概要と展望2009

    • Author(s)
      吉岡信和, Bashar Nuseibeh
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 187-192

    • Related Report
      2008 Annual Research Report
  • [Journal Article] SQUAREではじめるセキュリティ要求工学2009

    • Author(s)
      Nancy R. Mead, 吉岡信和
    • Journal Title

      情報処理 Vol.50, No.3

      Pages: 193-197

    • Related Report
      2008 Annual Research Report
  • [Journal Article] A Survey on Security Patterns2008

    • Author(s)
      Nobukazu Yoshioka, Hironori Washizaki, Katsuhisa Maruyama
    • Journal Title

      Progress in Informatics, National Institute of Informatics

      Pages: 35-47

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Survey on Security Patterns2008

    • Author(s)
      Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama,
    • Journal Title

      Progress in Informatics, National Institute of Informatics 5

      Pages: 35-47

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Presentation] Model-Driven Security Patterns Application and Validation2010

    • Author(s)
      Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka, Eduardo B.Fernandez
    • Organizer
      17th Conference on Pattern Languages of Programs (PLoP 2010)
    • Place of Presentation
      Reno/Tahoe Nevada, USA
    • Year and Date
      2010-10-16
    • Related Report
      2010 Annual Research Report
  • [Presentation] Aligning Security Requirements and Security Assurance Using the Common Criteria2010

    • Author(s)
      Kenji Taguchi, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko
    • Organizer
      2010 Fourth International Conference on Secure Software Integration and Reliability Improvement (SSIRI 2010)
    • Related Report
      2010 Annual Research Report 2010 Final Research Report
  • [Presentation] Model-Driven Security Patterns Application and Validation2010

    • Author(s)
      Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka, Eduardo B.Fernandez
    • Organizer
      17th Conference on Pattern Languages of Programs(PLoP2010)
    • Related Report
      2010 Final Research Report
  • [Presentation] コモンクライテリアのためのモデリング手法の提案2009

    • Author(s)
      吉岡信和, 田口研治, 飛田孝幸, 金子浩之
    • Organizer
      情報処理学会 168回ソフトウェア工学研究会
    • Place of Presentation
      (株)インターネットイニシアティブ 東京本社
    • Year and Date
      2009-05-28
    • Related Report
      2009 Annual Research Report
  • [Presentation] コモンクライテリアのためのモデリング手法の提案2009

    • Author(s)
      吉岡信和, 田口研治, 飛田孝幸, 金子浩之
    • Organizer
      情報処理学会168回ソフトウェア工学研究会
    • Related Report
      2010 Final Research Report
  • [Presentation] Classifying security patterns2008

    • Author(s)
      Eduardo Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukuzawa
    • Organizer
      the 10th Asia Pacific Web Conference
    • Related Report
      2010 Final Research Report
  • [Presentation] Classifying security patterns2008

    • Author(s)
      Eduardo Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo. Yoshiaki Fukuzawa
    • Organizer
      the 10th Asia Pacific Web Conference
    • Place of Presentation
      中国Shenyang(瀋陽)Inter Continental Shenyang Hotel
    • Related Report
      2008 Annual Research Report
  • [Remarks] ホームページ等

    • Related Report
      2010 Final Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi