{"updated":"2025-01-21T21:25:06.817749+00:00","links":{},"id":74832,"created":"2025-01-18T23:32:11.893543+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00074832","sets":["6164:6165:6462:6463"]},"path":["6463"],"owner":"5","recid":"74832","title":["Challenges and design considerations for the authorizationanalysis of a software framework"],"pubdate":{"attribute_name":"公開日","attribute_value":"2009-10-19"},"_buckets":{"deposit":"039b0d24-99ed-4450-9469-a0108f37335f"},"_deposit":{"id":"74832","pid":{"type":"depid","value":"74832","revision_id":0},"owners":[5],"status":"published","created_by":5},"item_title":"Challenges and design considerations for the authorizationanalysis of a software framework","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Challenges and design considerations for the authorizationanalysis of a software framework"},{"subitem_title":"Challenges and design considerations for the authorizationanalysis of a software framework","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ評価・監査 ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2009-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"KDDI R&D Laboratories,Inc."},{"subitem_text_value":"KDDI R&D Laboratories,Inc."},{"subitem_text_value":"KDDI R&D Laboratories,Inc."},{"subitem_text_value":"KDDI R&D Laboratories,Inc."}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI R&D Laboratories,Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories,Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories,Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories,Inc.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/74832/files/IPSJ-CSS2009C43.pdf"},"date":[{"dateType":"Available","dateValue":"2011-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2009C43.pdf","filesize":[{"value":"235.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"93abe591-2c65-49b6-9cf9-0f716e628478","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2009 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Wook, Shin"},{"creatorName":"Shinsaku, Kiyomoto"},{"creatorName":"Kazuhide, Fukushima"},{"creatorName":"Toshiaki, Tanaka"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Wook, Shin","creatorNameLang":"en"},{"creatorName":"Shinsaku, Kiyomoto","creatorNameLang":"en"},{"creatorName":"Kazuhide, Fukushima","creatorNameLang":"en"},{"creatorName":"Toshiaki, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"We suggest an automated analysis tool design, where we can analyze the permission-basedsecurity of a software framework and test if an application execution can be completed withgiven permissions. For the analysis, we take two approaches. The one is theorem proving-basedapproach that formally specifies permission manipulation operations of the framework, definessecurity of the system, and then tests the logical correctness of the operations. The other is asimple simulation that partially executes a given application codes with given authorization.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We suggest an automated analysis tool design, where we can analyze the permission-basedsecurity of a software framework and test if an application execution can be completed withgiven permissions. For the analysis, we take two approaches. The one is theorem proving-basedapproach that formally specifies permission manipulation operations of the framework, definessecurity of the system, and then tests the logical correctness of the operations. The other is asimple simulation that partially executes a given application codes with given authorization.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2009"}]},"relation_version_is_last":true,"weko_creator_id":"5"}}