• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Formal models for verifying multi-threaded recursive programs

Research Project

Project/Area Number 21700045
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Software
Research InstitutionKochi University of Technology

Principal Investigator

TAKATA Yoshiaki  Kochi University of Technology, 工学部, 准教授 (60294279)

Project Period (FY) 2009 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2010: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2009: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Keywords自動検証 / モデル検査 / 形式モデル / プッシュダウンシステム / 形式的検証 / 形式言語理論 / マルチスレッド
Research Abstract

In this study, we proposed a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-based access control (HBAC) was assumed as the access control model. A security specification is given in terms of information flow. We say that a program P satisfies a specification S if P is type-safe when we consider each security class in S as a type. We first defined the problem as the one to insert check statements into a given program P to obtain a program P' that is type-safe for a given specification S. This type system is sound in the sense that if a program P is type-safe for a specification S, then P has noninterference property for S. Next, the problem was shown to be co-NP-hard and we proposed a fix-point computation algorithm for solving the problem. The experimental results based on our implemented system showed that the proposed method can work within reasonable time.

Report

(3 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • Research Products

    (4 results)

All 2010

All Journal Article (2 results) (of which Peer Reviewed: 2 results) Presentation (2 results)

  • [Journal Article] Automatic generation of history-based access control from information flow specification, Automated Technology for Verification and Analysis, ATVA 20102010

    • Author(s)
      Yoshiaki Takata, Hiroyuki Seki
    • Journal Title

      Lecture Notes in Computer Science Vol.6252

      Pages: 259-275

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Automatic generation of history-based access control from information flow specification2010

    • Author(s)
      Yoshiaki Takata, Hiroyuki Seki
    • Journal Title

      8th International Symposium on Automated Technology for Verification and Analysis

      Volume: LNCS 6252 Pages: 259-275

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Presentation] 情報流仕様に基づくアクセス権検査文自動挿入法2010

    • Author(s)
      高田喜朗
    • Organizer
      日本ソフトウェア科学会第12回プログラミングとプログラミング言語ワークショップ
    • Place of Presentation
      香川県琴平温泉
    • Year and Date
      2010-03-04
    • Related Report
      2010 Final Research Report
  • [Presentation] 情報流仕様に基づくアクセス権検査文自動挿入法2010

    • Author(s)
      高田喜朗, 森田剛正, 関浩之
    • Organizer
      日本ソフトウェア科学会第12回プログラミングおよびプログラミング言語ワークショップ
    • Place of Presentation
      香川県仲多度郡琴平町
    • Year and Date
      2010-03-04
    • Related Report
      2009 Annual Research Report

URL: 

Published: 2009-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi