{"id":141272,"updated":"2025-01-20T19:28:45.741847+00:00","links":{},"created":"2025-01-19T00:18:53.012483+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00141272","sets":["1164:1384:8208:8209"]},"path":["8209"],"owner":"11","recid":"141272","title":["トレーサビリティに基づく仕様・設計におけるセキュリティ分析支援"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-03-05"},"_buckets":{"deposit":"300bdebc-09c6-40ca-a190-f07abefc1190"},"_deposit":{"id":"141272","pid":{"type":"depid","value":"141272","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"トレーサビリティに基づく仕様・設計におけるセキュリティ分析支援","author_link":["205526","205522","205525","205528","205533","205536","205537","205539","205532","205541","205534","205529","205540","205524","205531","205530","205538","205527","205523","205535"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"トレーサビリティに基づく仕様・設計におけるセキュリティ分析支援"},{"subitem_title":"Support for Security Analysis of Design Models based on Traceability","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"要求分析","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2015-03-05","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学"},{"subitem_text_value":"ソニーデジタルネットワークアプリケーションズ株式会社"},{"subitem_text_value":"株式会社考作舎"},{"subitem_text_value":"株式会社ネットワーク応用技術研究所"},{"subitem_text_value":"株式会社ネットワーク応用技術研究所"},{"subitem_text_value":"株式会社ネットワーク応用技術研究所"},{"subitem_text_value":"九州大学"},{"subitem_text_value":"九州大学"},{"subitem_text_value":"大連理工大学"},{"subitem_text_value":"九州大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Sony Digital Network Applications. Inc.","subitem_text_language":"en"},{"subitem_text_value":"Kosakusha, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Network Application Engineering Laboratories, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Network Application Engineering Laboratories, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Network Application Engineering Laboratories, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Dalian University of Technolog","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/141272/files/IPSJ-SE15187045.pdf"},"date":[{"dateType":"Available","dateValue":"2017-03-05"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SE15187045.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"12"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"44ce662b-5b23-45c5-9bdc-99e75e6604ec","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2015 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"谷津, 弘一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"松並, 勝"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"澤田, 壽實"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"平川, 剛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"野田, 厚志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小幡, 直也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"安藤, 崇央"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"久住, 憲嗣"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"孔, 維強"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"福田, 晃"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hirokazu, Yatsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaru, Matsunami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshimi, Sawada","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Go, Hirakawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Atsushi, Noda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naoya, Obata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takahiro, Ando","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kenji, Hisazumi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Weiqiang, Kong","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Fukuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10112981","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在のシステム開発で実施されるセキュリティ分析においては,実装工程では,ソースコードの静的解析や,バイナリコード上での動的な脆弱性判断等,ツールによる分析支援が可能であるが,それ以前の工程では体系立てられた分析方法はなく,分析を支援するツールも見られない.本稿では,システムの実装工程以前に作成される仕様や設計モデル上で実施可能な,トレーサビリティに基づくセキュリティ分析方法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Usually, security analysis is mainly done at the implementation phase of system development. In this paper, we propose an universal approach of security analysis at the design phase based on traceability established among security threats, measures for threats and SysML diagrams.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"5","bibliographic_titles":[{"bibliographic_title":"研究報告ソフトウェア工学(SE)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2015-03-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"45","bibliographicVolumeNumber":"2015-SE-187"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}