@inproceedings{oai:ipsj.ixsq.nii.ac.jp:00074832, author = {Wook, Shin and Shinsaku, Kiyomoto and Kazuhide, Fukushima and Toshiaki, Tanaka and Wook, Shin and Shinsaku, Kiyomoto and Kazuhide, Fukushima and Toshiaki, Tanaka}, book = {コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集}, month = {Oct}, note = {We suggest an automated analysis tool design, where we can analyze the permission-basedsecurity of a software framework and test if an application execution can be completed withgiven permissions. For the analysis, we take two approaches. The one is theorem proving-basedapproach that formally specifies permission manipulation operations of the framework, definessecurity of the system, and then tests the logical correctness of the operations. The other is asimple simulation that partially executes a given application codes with given authorization., We suggest an automated analysis tool design, where we can analyze the permission-basedsecurity of a software framework and test if an application execution can be completed withgiven permissions. For the analysis, we take two approaches. The one is theorem proving-basedapproach that formally specifies permission manipulation operations of the framework, definessecurity of the system, and then tests the logical correctness of the operations. The other is asimple simulation that partially executes a given application codes with given authorization.}, pages = {1--6}, publisher = {情報処理学会}, title = {Challenges and design considerations for the authorizationanalysis of a software framework}, volume = {2009}, year = {2011} }