• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2010 Fiscal Year Final Research Report

Automatic Analys is and Generation Methods for Language-based Access Control

Research Project

  • PDF
Project/Area Number 20500034
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Software
Research InstitutionNara Institute of Science and Technology

Principal Investigator

SEKI Hiroyuki  Nara Institute of Science and Technology, 情報科学研究科, 教授 (80196948)

Co-Investigator(Renkei-kenkyūsha) TAKATA Yoshiaki  高知工科大学, 工学部, 准教授 (60294279)
Project Period (FY) 2008 – 2010
Keywordsアクセス制御 / 情報流解析 / セキュリティ / 実行履歴 / スタック検査 / 自動生成 / 静的解析
Research Abstract

We defined the automatic generation problem as the one to insert access check commands into a given recursive program so that the program satisfies a given security specification. First, the problem was shown to be co NP-hard. Next, we proposed an algorithm solving the automatic generation problem based on PDS model checking. We also showed that the proposed algorithm works efficiently for sample programs based on the experiments conducted on the automatic generation tool.

  • Research Products

    (9 results)

All 2010 2009 2008

All Journal Article (2 results) (of which Peer Reviewed: 2 results) Presentation (7 results)

  • [Journal Article] Comparison of the expressive power of language-based access control models2009

    • Author(s)
      Yoshiaki Takata Hiroyuki Seki
    • Journal Title

      IEICES Transactions on Information and Systems E92-D(5)

      Pages: 1033-1036

    • Peer Reviewed
  • [Journal Article] Formal language theoretic approach to the disclosure tree strategy in trust management2009

    • Author(s)
      Yoshiaki Takata Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information adn Systems E92-D(2)

      Pages: 200-210

    • Peer Reviewed
  • [Presentation] Automatic generation of history-based access control from information flow specification2010

    • Author(s)
      高田喜朗, 関浩之
    • Organizer
      8^<th> International Symposium on Automated Technology for Verification and Analysis, 259-275
    • Place of Presentation
      Singapore, Lecture Notes in Computer Science 6252
    • Year and Date
      2010-09-23
  • [Presentation] 情報流仕様に基づくアクセス権検査文自動生成法2010

    • Author(s)
      高田喜朗, 関浩之, 森田剛正
    • Organizer
      日本ソフトウェア科学会第12回プログラミングおよびプログラミング論文集,161-175
    • Place of Presentation
      香川県多度郡琴平町
    • Year and Date
      2010-03-04
  • [Presentation] ソフトウェアの静的解析と動的検査-言語ベースセキュリティを例にして-2009

    • Author(s)
      関浩之
    • Organizer
      情報処理学会組込みシステムシンポジウム2009
    • Place of Presentation
      東京
    • Year and Date
      2009-10-21
  • [Presentation] 情報流解析に基づくアクセス制御文の自動生成2009

    • Author(s)
      森田剛正, 高田喜朗, 関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会,電子情報通信学会技術研究報告SS2009-23
    • Place of Presentation
      北海道北見市
    • Year and Date
      2009-08-07
  • [Presentation] 情報流解析に基づくアクセス権検査文自動挿入法2009

    • Author(s)
      高田喜朗, 森田剛正, 関浩之
    • Organizer
      日本ソフトウェア科学会第7回ディワークショップ論文集,99-103
    • Place of Presentation
      北海道亀田郡七飯町
    • Year and Date
      2009-07-15
  • [Presentation] アクセス制御-言語ベースセキュリティをめざして-2009

    • Author(s)
      関浩之
    • Organizer
      日本ソフトウェア科学会第7回ディ論文集,93-98
    • Place of Presentation
      北海道亀田郡七飯町
    • Year and Date
      2009-07-15
  • [Presentation] 情報流からの言語組み込みアクセス制御文の挿入2008

    • Author(s)
      高田喜朗, 関浩之
    • Organizer
      日本ソフトウェア科学会第6回ディペンダブルワークショップ論文集,141-143
    • Place of Presentation
      函館
    • Year and Date
      2008-07-04

URL: 

Published: 2012-01-26   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi