¥È¥Ã¥×   ÊÔ½¸ Åà·ë º¹Ê¬ ÍúÎò źÉÕ Ê£À½ ̾Á°Êѹ¹ ¥ê¥í¡¼¥É   ¿·µ¬ °ìÍ÷ ¸¡º÷ ºÇ½ª¹¹¿·   ¥Ø¥ë¥×   ºÇ½ª¹¹¿·¤ÎRSS

¸¦µæ¥Æ¡¼¥Þ

Last-modified: 2014-02-27 (ÌÚ) 13:55:39
Top/¸¦µæ¥Æ¡¼¥Þ

¸¦µæ¥Æ¡¼¥Þ

¡Ö¸í¤ê¤Î¤Ê¤¤¡×¥½¥Õ¥È¥¦¥§¥¢¤ò¡Ö¤Ê¤ë¤Ù¤¯Íưפˡ׺îÀ®¤¹¤ë¤¿¤á¤ÎÊýË¡¤Ë¤Ä¤¤¤Æ¸¦µæ¤·¤Æ¤¤¤Þ¤¹¡£Î㤨¤Ð¡¢

  1. ¥×¥í¥°¥é¥à¤Ë¸í¤ê¤¬¤Ê¤¤¤³¤È¤ò¤É¤¦³Î¤«¤á¤¿¤é¤è¤¤¤«?
  2. ¤ï¤«¤ê¤ä¤¹¤¤½ñ¤­Êý¤Ç»ÅÍͤò½ñ¤±¤Ð¡¢¤¢¤È¤Ï¼«Æ°Åª¤Ë¥×¥í¥°¥é¥à¤òÀ¸À®¤Ç¤­¤Ê¤¤¤«?¡Ê¤¢¤ë¤¤¤Ï¡¢¤Ê¤ë¤Ù¤¯´ÊÊؤÊÊýË¡¤Ç¥×¥í¥°¥é¥ß¥ó¥°¤Ç¤­¤Ê¤¤¤«?¡Ë

¤È¤¤¤Ã¤¿ÌäÂê¤ËºÇ¤â¶½Ì£¤¬¤¢¤ê¤Þ¤¹¡£¡Ö¸¡¾Ú¡×¡Ö·Á¼°Åª»ÅÍ͵­½Ò¡×¡Ö¼«Æ°À¸À®¡×Åù¤¬¥­¡¼¥ï¡¼¥É¤Ç¤¹¡£

¼ÂºÝ¤Ï¡¢¥×¥í¥°¥é¥à¤Î¡ÖÀµ¤·¤µ¤òÊݾڤ¹¤ë¤³¤È¡×¡¢¥×¥í¥°¥é¥ß¥ó¥°¤Î¡ÖÍưײ½¡×¡Ö¼«Æ°²½¡×¡¢¤Ê¤É¤Ë´Ø·¸¤¹¤ë¤³¤È¤ÏÉý¹­¤¯²¿¤Ç¤â¸¦µæ¥Æ¡¼¥Þ¤Î¸õÊä¤È¹Í¤¨¤Æ¤¤¤Þ¤¹¡£

researchtopics.png

´¶ÈÏÀʸ

¼ç¤Ê³Ø³°È¯É½

  • Lamilla Alvarez & Takata. A formal verification of a subset of information-based access control based on extended weighted pushdown system, IEICE Trans. Inf. & Syst., E97-D(5), 2014, to appear.
  • Lamilla Alvarez & Takata. An HBAC-based approximation for IBAC programs, SIN 2013, 277--281.
  • Takata & Seki. Automatic generation of history-based access control from information flow specification, ATVA 2010, Lecture Notes in Computer Science 6252, 259--275.
  • Takata & Seki. Formal language theoretic approach to the disclosure tree strategy in trust negotiation, IEICE Trans. Inf. & Syst., E92-D(2), 200-210, 2009.
  • ¹âÅÄ, ²¦, ´Ø. ¼Â¹ÔÍúÎò¤Ë´ð¤Å¤¯¥¢¥¯¥»¥¹À©¸æ¤Î·Á¼°¥â¥Ç¥ë¤È¸¡¾Ú, ¿®³ØÏÀD, J91-D(4), 847-858, 2008.
  • Yagi, Takata, & Seki. A labeled transition model A-LTS for history-based aspect weaving and its expressive power, IEICE Trans. Inf. & Syst., E90-D(5), 799--807, 2007.
  • Yagi, Takata, & Seki. A static analysis using tree automata for XML access control, ¥³¥ó¥Ô¥å¡¼¥¿¥½¥Õ¥È¥¦¥§¥¢, 23(3), 51--65, 2006.
  • ¹âÅÄ, Ãæ¼, ´Ø. XMLʸ½ñ¤ËÂФ¹¤ë¥¢¥¯¥»¥·¥Ó¥ê¥Æ¥£¥¬¥¤¥É¥é¥¤¥óŬ¹çÀ­¸¡¾Ú, ¿®³ØÏÀD, J89-D(4), 705--715, 2006.