{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010279","sets":["581:612:619"]},"path":["619"],"owner":"1","recid":"10279","title":["グループを用いた階層的アクセス制御方式"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-06-15"},"_buckets":{"deposit":"fe165f76-4f17-41bc-9244-c2bdd660a784"},"_deposit":{"id":"10279","pid":{"type":"depid","value":"10279","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"グループを用いた階層的アクセス制御方式","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"グループを用いた階層的アクセス制御方式"},{"subitem_title":"Group Oriented Hierarchical Access Control System","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"論文","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2006-06-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"金沢工業大学情報工学科"},{"subitem_text_value":"金沢工業大学情報工学科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Information and Computer Engineering, Kanazawa Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Computer Engineering, Kanazawa Institute of Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10279/files/IPSJ-JNL4706033.pdf"},"date":[{"dateType":"Available","dateValue":"2008-06-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4706033.pdf","filesize":[{"value":"363.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"155e4211-2a7e-482a-a3d5-a11179c45d66","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中盛, 友紀"},{"creatorName":"永瀬, 宏"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuki, Nakamori","creatorNameLang":"en"},{"creatorName":"Hiroshi, Nagase","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ファイルシステムにおけるアクセスコントロールを強制的に実施する有力な手法として,BLP(Bell and LaPadula)モデルを原則とした階層的運用がある.この運用では,情報フローを下位から上位に1 方向化するため,機密性に優れたシステムの構築が可能である.また,多数のファイルを扱う状況のために,機械的に階層レベル情報を付加するSLA(Security Level Assignment)アルゴリズムが用意されている.しかし,BLP モデルを原則とした運用は,アクセス権限が階層的で,かつ単一の実世界を対象とする運用方式である.したがって,複数のグループが連携・競合し,各グループのアクセス権限が階層的な実世界の運用,すなわち複数のBLP モデルが存在する場合の運用が考慮されていない.そこで本稿では,グループが存在する場合の階層的アクセス制御手法について提案する.また,ネットワークの分野などで増加してきている動的なグループ形成に対応するために,SLA アルゴリズムを拡張したグループ化アルゴリズムの提案を行う.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The hierarchical access control using the BLP (Bell and LaPadula) model is known as effective technique of the mandatory access control in a file system. Since this access control restricts information flow to one-way from low level to high level, the system of high confidentiality can be built. Moreover, SLA (Security Level Assihnment) algorithm is prepared in order to determine the hierarchical level information for many files. The access control design based on the BLP model operates only in a single computer with hierarchical access right. Therefore, use in the real world is not considered where the plural groups with hierarchical access rights cooperate or conflict, that is equivalent to plural BLP models. This paper proposes the hierarchical access control technique when the group exisit. An algorithm which extends the existing SLA algorithm is proposed to correspond to increasing demands of dynamic group formation issued in network community.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1931","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1918","bibliographicIssueDates":{"bibliographicIssueDate":"2006-06-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"47"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"ネットワークセキュリティ"}]},"weko_creator_id":"1"},"id":10279,"updated":"2025-01-23T02:57:29.569139+00:00","links":{},"created":"2025-01-18T22:45:14.011430+00:00"}