{"created":"2025-01-18T23:49:59.628448+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106621","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106621","title":["ファイル操作による機密情報拡散をKVM上で追跡する機能の評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"524c2129-a9c3-4181-9335-4bac5e386eb1"},"_deposit":{"id":"106621","pid":{"type":"depid","value":"106621","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"ファイル操作による機密情報拡散をKVM上で追跡する機能の評価","author_link":["13095","13097","13094","13096","13093","13092"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ファイル操作による機密情報拡散をKVM上で追跡する機能の評価"},{"subitem_title":"Evaluation of Tracing Classified Information Diffusion for File Operations on KVM","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"情報漏えいの防止,仮想化,KVM","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"岡山大学大学院自然科学研究科"},{"subitem_text_value":"岡山大学大学院自然科学研究科"},{"subitem_text_value":"岡山大学大学院自然科学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Natural Science and Technology, Okayama University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106621/files/IPSJCSS2014098.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014098.pdf","filesize":[{"value":"390.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7c6d58f5-b397-4c73-95f1-4bacad177bdc","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"藤井, 翔太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山内, 利宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"谷口, 秀夫"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shota, Fujii","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshihiro, Yamauchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hideo, Taniguchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,機密情報が漏えいする事例が増加している.この問題へ対処するた めに,計算機内の機密情報が拡散する状況を追跡し,機密情報を有する資源 を把握する機能として機密情報の拡散追跡機能をOS内に実現した.また,仮想計算機モニタにおける機密情報の拡散追跡機能を設計した.本稿では,ファイル操作とプロセス生成による機密情報の拡散追跡機能のKVM内での実装方式について述べる. また,実装した機能の改変コード量とオーバヘッド量を報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, the cases of classified information leakage are increasing.To address this problem, we realized the function for tracing classified information diffusion within OS.The function traces classified information diffusion and manages resources which have classified information.In addition, we designed the function for tracing a guest OS's classified information diffusion using virtual machine monitor.This paper describes the implementation of the function for file operations and process creation with the KVM.Further, this paper reports the amount of modified source codes and overheads.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"758","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"751","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":106621,"updated":"2025-01-21T09:24:02.868272+00:00","links":{}}