• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2008 Fiscal Year Self-evaluation Report

Highly Scalable Software Security for Information Explosion Environments

Planned Research

  • PDF
Project AreaCyber Infrastructure for the Information-explosion Era
Project/Area Number 18049027
Research Category

Grant-in-Aid for Scientific Research on Priority Areas

Allocation TypeSingle-year Grants
Review Section Science and Engineering
Research InstitutionThe University of Tokyo (2008-2010)
Tokyo Institute of Technology (2006-2007)

Principal Investigator

柴山 悦哉  The University of Tokyo, 情報基盤センター, 教授 (80162642)

Project Period (FY) 2006 – 2010
Keywordsアスペクト指向 / 開発環境 / ソフトウェア検証 / テスト自動化 / オーバーレイネットワーク / コンテンツ配信 / Webアプリケーション
Research Abstract

高度にスケーラブルな情報基盤を安全に構築・運用することを目的に, 以下の3 点に焦点を絞った研究を行う.
・高度にスケーラブルなアクセス制御基盤
・高度にスケーラブルかつ安全なホスティング基盤
・高度にスケーラブルかつ動的なアプリケーション更新基盤
また, この目的を達成するために, ソフトウェア検証, ソフトウェアテスト, 実行時ミドルウェアの技術を組み合わせ, 設計から運用にいたるソフトウェアライフサイクルを意識した研究開発を行なう.

  • Research Products

    (5 results)

All 2009 2008 2007 2006

All Journal Article (2 results) (of which Peer Reviewed: 2 results) Presentation (3 results)

  • [Journal Article] AspectScope An Outline Viewer for AspectJ Programs2007

    • Author(s)
      Michihiro Horie, Shigeru Chiba
    • Journal Title

      Journal of Object Technolgoy Vol. 6

      Pages: 341-361

    • Peer Reviewed
  • [Journal Article] An Aspect-Oriented Approach to Modular Behavioral Specifications2006

    • Author(s)
      Kiyoshi Yamada, Takuo Watanabe
    • Journal Title

      Electronic Notes in Theoretical Computer Science Vol. 163

      Pages: 45-56

    • Peer Reviewed
  • [Presentation] Automatic Security Testing for Web Applications2009

    • Author(s)
      Thanh-Binh Dao, Etsuya Shibayama
    • Organizer
      International Symposium on Engineering Secure Software and Systems
    • Place of Presentation
      Leuven, Belgium
    • Year and Date
      2009-02-06
  • [Presentation] Enforcing Appropriate Process Execution for Exploiting Idle Resources from Outside Operating Systems2008

    • Author(s)
      Yoshihisa Abe, Hiroshi Yamada, Kenji Kono
    • Organizer
      ACM European Conference on Computer Systems
    • Place of Presentation
      Glasgow, Scotland
    • Year and Date
      2008-04-02
  • [Presentation] FoxyTechnique: Tricking Operating System Policies with a Virtual Machine Monitor2007

    • Author(s)
      Hiroshi Yamada, Kenji Kono
    • Organizer
      ACM International Conference on Virtual Execution Environments
    • Place of Presentation
      San Diego, USA
    • Year and Date
      2007-06-13

URL: 

Published: 2010-06-11   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi