{"created":"2025-01-19T00:47:27.608521+00:00","updated":"2025-01-20T05:14:27.197026+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00178082","sets":["1164:2822:9120:9121"]},"path":["9121"],"owner":"11","recid":"178082","title":["セキュアプロセッサ利用環境におけるDMAの実現手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-03-02"},"_buckets":{"deposit":"0ec8acf4-9731-49a6-aa6d-c9990af8a02d"},"_deposit":{"id":"178082","pid":{"type":"depid","value":"178082","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"セキュアプロセッサ利用環境におけるDMAの実現手法","author_link":["380102","380093","380100","380094","380095","380096","380101","380098","380099","380097"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュアプロセッサ利用環境におけるDMAの実現手法"},{"subitem_title":"Approach to Direct Memory Access for Tamper Resistant System using Secure Processor","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"プロセッサ及び演算処理","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2017-03-02","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/178082/files/IPSJ-EMB17044007.pdf","label":"IPSJ-EMB17044007.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-EMB17044007.pdf","filesize":[{"value":"1.7 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"42"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"2f72afba-cba4-462f-b859-c7b2c971ad75","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 璃人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"梶原, 拓也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"宮永, 瑞紀"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"入江, 英嗣"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"坂井, 修一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Rihito, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takuya, Kajiwara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mizuki, Miyanaga","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidetsugu, Irie","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuichi, Sakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12149313","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-868X","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"セキュアなプログラム実行を支援するセキュアプロセッサ利用環境下においては,信頼性を保証するため,従来の外部デバイスによる DMA (Direct Memory Access) の方法を直接適用することができない.本稿では信頼できる外部デバイスの存在を仮定し,本来の DMA に期待されるプロセッサからの負荷のオフロードとデータの秘匿性 ・ 完全性を両立した DMA を実現するためのモデルと設計を論じる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In an enviroimient using secure processor to support secure program execution, because of its integrity check mechanism, DMA (Direct Memory Access) method can not be directly applied. In this paper, we discuss models and designs to realize DMA executed by tmsted extemal devices, which offload 10 operation from the processor and guarantee confidentiality / integrity of data.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告組込みシステム(EMB)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-03-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2017-EMB-44"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":178082,"links":{}}