Co-Investigator(Kenkyū-buntansha) |
TAKAHASHI Shin Tokyo Institute of Technology, Graduate School of Information Science and Engineering, Assistant, 大学院・情報理工学研究科, 助手 (00272691)
WAKITA Ken Tokyo Institute of Technology, Graduate School of Information Science and Engineering, Associate Professor, 大学院・情報理工学研究科, 助教授 (10242265)
MATSUOKA Satoshi Tokyo Institute of Technology, Global Scientific Information and Computing Center, Professor, 学術国際情報センター, 教授 (20221583)
|
Research Abstract |
As a first step to building next generation secure information infrastructures, we have investigated the following three areas, representing three different viewpoints : descriptions, users, and systems. 1. Flexible Security Policy Description Schemes and Their Enforcement Mechanisims Taking account that mutual ly untrusted parties may have to collaborate or do trade with one another in the Internet era, we propose a new model of security policy that is compatible with privacy protections. Our research results include a model of policy negotiation using at tribute authentications, description schemes based upon security automata, an enforcement mechanism with instrumentation, and optimization with partial evaluations. 2. Convenient Methodologies for Constructions and Operations of Secure Software Systems We propose (semi-) automated construct ions and operations of secure software systems by developers, operators, and end-users. Our research results include automatic exploitations of security policies from information of package managers, semi-automated constructions of secure programuing language processors, development environments of secure software including a visual language system and a debugger. 3. Foundations of Next Generation Information Infrastructures We propose various security mechanisms for computing systems utilizing massive resources. Our research results include a fault-tolerant and high performance communication library, a scalable authentication algorithm, a remote installation and recovery tool for PC clusters, a virtual machine technology for the resolution of interference among virtual organizations.
|