• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Software Analysis based on Formaly Language Theory and Its Application to Security Verification

Research Project

Project/Area Number 23300008
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Software
Research InstitutionNagoya University (2012-2015)
Nara Institute of Science and Technology (2011)

Principal Investigator

Seki Hiroyuki  名古屋大学, 情報科学研究科, 教授 (80196948)

Co-Investigator(Kenkyū-buntansha) OGAWA MIZUHITO  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (40362024)
KAJI YUICHI  奈良先端科学技術大学院大学, 情報科学研究科, 准教授 (70263431)
HASHIMOTO KENJI  名古屋大学, 大学院情報科学研究科, 助教 (90548447)
Project Period (FY) 2011-04-01 – 2016-03-31
Project Status Completed (Fiscal Year 2015)
Budget Amount *help
¥20,020,000 (Direct Cost: ¥15,400,000、Indirect Cost: ¥4,620,000)
Fiscal Year 2014: ¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Fiscal Year 2013: ¥5,070,000 (Direct Cost: ¥3,900,000、Indirect Cost: ¥1,170,000)
Fiscal Year 2012: ¥5,070,000 (Direct Cost: ¥3,900,000、Indirect Cost: ¥1,170,000)
Fiscal Year 2011: ¥5,330,000 (Direct Cost: ¥4,100,000、Indirect Cost: ¥1,230,000)
Keywordsソフトウェア検証 / 形式言語理論 / モデル検査 / XML / 情報保存性 / 木変換器 / セキュリティ / 木オートマトン / 圧縮 / 頂点問合せ / 木文法
Outline of Final Research Achievements

We obtained the following research results on information preservation and security of structured data, especially XML documents, based on tree language theory. A translation v is said to preserve a query q if there is a query q’ that can obtain from v(t) the same result when q is applied to t. We obtained decidability and complexity results on the problem of deciding preservation based on tree transducers and n-ary node queries. An inference attack is a behavior that tries to obtain the result of an unauthorized query by combining the result of authorized queries and other public information. We focused on k-secrecy and l-diversity as security notions against inference attacks. We discussed the decidability of schema k-secrecy problem and also compared the effectiveness of our two proposed methods of deciding l-diversity.

Report

(5 results)
  • 2015 Final Research Report ( PDF )
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • 2012 Annual Research Report
  • 2011 Annual Research Report
  • Research Products

    (13 results)

All 2016 2015 2014 2013 Other

All Journal Article (3 results) (of which Peer Reviewed: 3 results) Presentation (10 results) (of which Int'l Joint Research: 1 results,  Invited: 1 results)

  • [Journal Article] Determinacy and Subsumption of Single-valued Bottom-up Tree Transducers2016

    • Author(s)
      Kenji Hashimoto, Ryuta Swada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E99-D Pages: 575-587

    • NAID

      130005131811

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Node Query Preservation for Deterministic Linear Top-Down Tree Transducers2015

    • Author(s)
      Kazuki Miyahara, Kenji Hashimoto and Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E89-D(3) Pages: 512-523

    • NAID

      110009642350

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Deciding Schema k-Secrecy for XML Databases2013

    • Author(s)
      4. Chittaphone Phonharath, Kenji Hashimoto, and Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E96-D(6) Pages: 1268-1277

    • NAID

      10031193987

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Presentation] 拡張線形ボトムアップ木変換器の関数性の多項式時間判定2015

    • Author(s)
      石原 鷹, 橋本 健二, 関 浩之, 酒井 正彦
    • Organizer
      第104回情報処理学会・プログラミング研究会
    • Place of Presentation
      富山市
    • Year and Date
      2015-06-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Query-based l-diversity2015

    • Author(s)
      Chittaphone Phonharath, Ryonosuke Takayama, Kenji Hashimoto and Hiroyuki Seki
    • Organizer
      7th International Conference on Advances in Databases, Knowledge, and Data Applications
    • Place of Presentation
      Roma, Italy
    • Year and Date
      2015-05-25
    • Related Report
      2014 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Query-based l-diversity2015

    • Author(s)
      Chittaphone Phonharath, Ryunosuke Takayama, Kenji Hashimoto and Hiroyuki Seki
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会
    • Place of Presentation
      熊本市
    • Year and Date
      2015-05-12
    • Related Report
      2014 Annual Research Report
  • [Presentation] 木文法に基づく圧縮XML文書に対する直接更新手法の評価2015

    • Author(s)
      後藤健志,尾上栄浩,橋本健二,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会,SS2014-45, 114(416), 73-78
    • Place of Presentation
      鳥取県
    • Year and Date
      2015-01-27
    • Related Report
      2013 Annual Research Report
  • [Presentation] 木文法による圧縮XML文書に対する問合せと更新手法2014

    • Author(s)
      尾上栄浩,橋本健二,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会,SS2014-28, 114(271), 17-22
    • Place of Presentation
      高知県
    • Year and Date
      2014-10-23
    • Related Report
      2013 Annual Research Report
  • [Presentation] Determinacy and Subsumption for Single-valued Bottom-up Tree Transducers2013

    • Author(s)
      80. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara
    • Organizer
      Proceedings of the 7th International Conference on Language and Automata Theory and Applications (LATA 2013), April 2013, Lecture Notes in Computer Science 7810, pp.335-346
    • Place of Presentation
      Bilbao, Spain
    • Related Report
      2012 Annual Research Report
  • [Presentation] Static Analysis for k-secrecy against Inference Attacks

    • Author(s)
      Chittaphone Phonharath, Kenji Hashimoto and Hiroyuki Seki
    • Organizer
      Korea-Japan Joint Workshop on Software Science and Engineering
    • Place of Presentation
      高麗大学, 韓国
    • Related Report
      2011 Annual Research Report
  • [Presentation] Multiple Context-Free Grammars: Basic Properties and Complexity

    • Author(s)
      Hiroyuki Seki
    • Organizer
      the Second Workshop on Multiple Context-Free Grammars and Related Formalisms (MCFG+2)
    • Place of Presentation
      奈良県文化会館
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] Trans-Organizational Role-Based Access Control

    • Author(s)
      Ramon Mejia, Yuichi Kaji and Hiroyuki Seki
    • Organizer
      ACM Computer and Communications Security (ACM CCS) 2011
    • Place of Presentation
      Chicago, USA
    • Related Report
      2011 Annual Research Report
  • [Presentation] Verification of the Security against Inference Attacks on XML Databases

    • Author(s)
      Chittaphone Phonharath, Kenji Hashimoto and Hiroyuki Seki
    • Organizer
      1st International Workshop on Trends in Tree Automata and Tree T2ransducers (TTATT 2012)
    • Place of Presentation
      名古屋大学
    • Related Report
      2011 Annual Research Report

URL: 

Published: 2011-04-06   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi