{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00179008","sets":["1164:4061:9092:9142"]},"path":["9142"],"owner":"11","recid":"179008","title":["セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-05-18"},"_buckets":{"deposit":"c105481d-0922-4817-af07-5d52fc586be2"},"_deposit":{"id":"179008","pid":{"type":"depid","value":"179008","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験","author_link":["385043","385044","385052","385051","385042","385048","385050","385047","385045","385039","385040","385049","385041","385046"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験"},{"subitem_title":"Evaluation Practice for the Effectiveness of CC-Case as an Integrated Method of Security Requirement Analysis and Assurance","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ・認証技術","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2017-05-18","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"国立情報学研究所"},{"subitem_text_value":"名古屋大学"},{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"INSTITUTE of INFORMATION SECURITY","subitem_text_language":"en"},{"subitem_text_value":"TOKYO DENKI UNIVERSITY","subitem_text_language":"en"},{"subitem_text_value":"TOKYO DENKI UNIVERSITY","subitem_text_language":"en"},{"subitem_text_value":"NATIONAL INSTITUTE OF INFORMATICS","subitem_text_language":"en"},{"subitem_text_value":"NAGOYA UNIVERSITY","subitem_text_language":"en"},{"subitem_text_value":"INSTITUTE of INFORMATION SECURITY","subitem_text_language":"en"},{"subitem_text_value":"INSTITUTE of INFORMATION SECURITY","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/179008/files/IPSJ-UBI17054016.pdf","label":"IPSJ-UBI17054016.pdf"},"date":[{"dateType":"Available","dateValue":"2019-05-18"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-UBI17054016.pdf","filesize":[{"value":"2.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"36"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"9c7314f0-7b20-4e8f-8538-0663a8bb8ed4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"金子, 朋子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"髙橋, 雄志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"勅使河原, 可海"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 信和"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山本, 修一郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大久保, 隆夫"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田中, 英彦"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoko, Kaneko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuji, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshimi, Teshigawara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Nobukazu, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuichirou, Yamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Ookubo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11838947","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8698","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"筆者らが提案してきた CC-Case はコモンクライテリア (CC) とアシュアランスケースを用いてセキュリティ要求分析と保証を実現する手法である.CC-Case 自体が含んでいる要素の中でもライフサイクル全体を通じて用いられるアシュアランスケースは根幹をなすものである.CC-Case のアシュアランスケースは単に GSN の表記方法ではなく,プロセスを論理モデルとして定義し,そのプロセスに則っていることを具体モデルによって提示する手法である.ただし,CC-Case のアシュアランスケースがどの程度の有効性をもつのかははっきり示していなかった.そこで,脅威分析のプロセスを論理モデル化した CC-Case,GSN と自然言語表記を比較する実験を実施し,要件の可視化と妥当性確認における有効性を評価した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We proposed CC-Case that is a security requirement analysis and assurance by using the Common Criteria (CC) and the assurance case. The assurance case is used by life-cycle in CC-Case. Therefore, it is main factor of CC-Case. The assurance case of CC-Case is not the description of GSN but the method which defines process as the logical model, and show the conformation to the process as the concrete model. However, the effectiveness of CC-Case has not shown. In this paper, we compare CC-Case which has logical model of threat analysis process, GSN, and Natural language representation by evaluating practice. We evaluate the effectiveness visualization and verification of requirements.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告ユビキタスコンピューティングシステム(UBI)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-05-18","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"16","bibliographicVolumeNumber":"2017-UBI-54"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":179008,"updated":"2025-01-20T04:54:29.008031+00:00","links":{},"created":"2025-01-19T00:48:17.657673+00:00"}