{"id":106620,"updated":"2025-01-21T09:24:00.963947+00:00","links":{},"created":"2025-01-18T23:49:59.578494+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106620","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106620","title":["論理型言語によるSELinux向け認可判定機構の実装と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"655a7d2b-5ee7-41a4-85bd-3010e173099a"},"_deposit":{"id":"106620","pid":{"type":"depid","value":"106620","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"論理型言語によるSELinux向け認可判定機構の実装と評価","author_link":["13089","13082","13090","13088","13084","13087","13083","13085","13091","13086"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"論理型言語によるSELinux向け認可判定機構の実装と評価"},{"subitem_title":"Implementation and Evaluation of Logic-Based Authorization System for SELinux","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"MANDATORY ACCESS CONTROL,POLICY DESCRIPTION,LOGIC PROGRAMMING,SELINUX","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"},{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"},{"subitem_text_value":"株式会社情報技研"},{"subitem_text_value":"株式会社情報技研"},{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Technology, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Technology, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106620/files/IPSJCSS2014097.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014097.pdf","filesize":[{"value":"402.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e1263190-4900-4bbc-881c-68bf69c742e6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"橋本, 正樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"滝澤, 峰利"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高山, 扶美彦"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"辻, 秀典"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田中, 英彦"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masaki, Hashimoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Minetoshi, Takizawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Fumihiko, Takayama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidenori, Tsuji","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"SELinuxはシステム侵害後の被害拡大を防止できる点で有用であるが,ポリシ記述の簡単化はもとより,ポリシの可読性や保守性,拡張性の向上が課題となっている.本研究は,論理型言語によるポリシ記述・処理系を実装することでそれら課題を解決し,記述範囲の拡張や強制アクセス制御機構の相互運用性向上をはかるものである.本稿では,SELinuxの認可判定機構をDatalogで置き換えた上で各種評価を行い,論理型言語によるポリシ処理系が現実的な性能で動作することを実証する.また,強制アクセス制御機構の構成変更に伴う改ざん耐性と迂回困難性の変化を検証し,提案機構の有用性と安全性に対する考察を行った結果を報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"SELinux is an effective MAC system for preventing the damage from spreading after security breaches, and there are many challenges  around its policy processing issues such as readability, maintainable and  scalability. Our research aims to improve its expressive power of policy description language and interoperability of authorization system, implementing them by logic programming language. In this paper, we replace the authorization system of SELinux with our logic-based authorization system of Datalog, and demonstrate the feasibility based on various performance evaluations. We also report the results of validating the impact of architectural changes and discussion about safety and usefulness of our system.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"750","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"743","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}