{"updated":"2025-01-21T09:24:37.462089+00:00","links":{},"id":106637,"created":"2025-01-18T23:50:00.423180+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106637","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106637","title":["個人認証のパーソナライズ化を目指した規則ベース個人認証の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"6f8aca52-4d85-4c9f-bea6-6c1528476ef4"},"_deposit":{"id":"106637","pid":{"type":"depid","value":"106637","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"個人認証のパーソナライズ化を目指した規則ベース個人認証の提案","author_link":["13198","13201","13199","13200"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"個人認証のパーソナライズ化を目指した規則ベース個人認証の提案"},{"subitem_title":"Personalized User Authentication by a Rule-Based Secret with Fluid-Data","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"個人認証,パーソナライズ,情報流,規則ベース認証","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"電気通信大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106637/files/IPSJCSS2014114.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014114.pdf","filesize":[{"value":"745.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"ecf054ea-ac3b-4f97-9cec-f1144f52dfe1","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高浪, 悟"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高田, 哲司"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Satoru, Takanami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsuji, Takada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"我々は日常生活を通じて多様な情報を能動的/受動的を問わず日々生成している.本論文ではこのような情報のことを「情報流データ」と定義する.移動履歴や電子メール,Twitterでの''つぶやき''はその一例である.本研究では,この情報流データを対象に規則に基づく秘密情報を用いた個人認証を提案し,この認証手法を用いることでサービスの利用者が画一的な認証手法の利用を強制させられるかわりに,利用者毎に好きな認証手法を利用可能にする枠組みについて説明する.これにより,画一的な認証手法を大勢の利用者が利用することを前提とした攻撃手法に対する対策となることを目指す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We have generated various information through dairy lives. We call such data set as \"fluid data''. A various kind of history information, such as moving, receiving emails and tweets, are included in the fluid data. In this work, we proposed a user authentication with a rule-based secret, and we discuss about personalized user authentication using the proposed authentication. A rule-based secret with fluid data enables users to use various kind of secrets in a user authentication. We expect that this becomes a measure against a mass attack using leaked information.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"882","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"875","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}