{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00185674","sets":["934:6391:9370:9371"]},"path":["9371"],"owner":"11","recid":"185674","title":["セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-01-30"},"_buckets":{"deposit":"cbce0961-d835-41f0-9ec6-2ebe3b4f1f7c"},"_deposit":{"id":"185674","pid":{"type":"depid","value":"185674","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験","author_link":["413739","413731","413736","413733","413732","413740","413734","413738","413742","413743","413744","413735","413741","413737"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュリティ要求分析・保証の統合手法CC-Caseの有効性評価実験"},{"subitem_title":"Evaluation Practice for the Effectiveness of CC-Case as an Integrated Method of Security Requirement Analysis and Assurance","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[コンシューマ・サービス論文] コモンクライテリア,アシュアランスケース,セキュリティケース,GSN,CC-Case","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2018-01-30","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"国立情報学研究所"},{"subitem_text_value":"名古屋大学"},{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Informatics","subitem_text_language":"en"},{"subitem_text_value":"Nagoya University","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/185674/files/IPSJ-TCDS0801003.pdf","label":"IPSJ-TCDS0801003.pdf"},"date":[{"dateType":"Available","dateValue":"2020-01-30"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TCDS0801003.pdf","filesize":[{"value":"3.8 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"47"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"40fb410e-cbbc-4f07-bbb3-e80df17f3afc","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"金子, 朋子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"髙橋, 雄志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"勅使河原, 可海"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉岡, 信和"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山本, 修一郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大久保, 隆夫"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田中, 英彦"}],"nameIdentifiers":[{}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoko, Kaneko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuji, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshimi, Teshigawara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Nobukazu, Yoshioka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shuichirou, Yamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takao, Ookubo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628043","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2186-5728","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"筆者らが提案してきたCC-Caseはコモンクライテリア(CC)とアシュアランスケースを用いてセキュリティ要求分析と保証を実現する手法である.CC-Case自体が含んでいる要素の中でもライフサイクル全体を通じて用いられるアシュアランスケースは根幹をなすものである.CC-Caseのアシュアランスケースは単にGSNの表記方法ではなく,プロセスを論理モデルとして定義し,そのプロセスに則っていることを具体モデルによって提示する手法である.ただし,CC-Caseのアシュアランスケースがどの程度の有効性を持つのかははっきり示されていなかった.そこで,本論文では脅威分析のプロセスを論理モデル化したCC-Case,プロセス構造を持たないGSNと構造化されていない平文(自然言語表記)を比較する実験を実施した.実験の結果,CC-Caseの要件の可視化と妥当性確認における有効性を確認することができた.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We have proposed CC-Case that is a security requirement analysis and assurance by using the Common Criteria (CC) and the assurance case. The assurance case is used by life-cycle in CC-Case. Therefore, it is main factor of CC-Case. The assurance case of CC-Case is not the description of GSN but the method which defines process as the logical model, and presents as the concrete model that conforms to the process. However, the effectiveness of CC-Case has not been shown. In this paper, we compared CC-Case which has logical model of threat analysis process, GSN, and non structured natural language representation by evaluating practice. We evaluated the effectiveness visualization and verification of requirements of CC-Case.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"26","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌コンシューマ・デバイス&システム(CDS)"}],"bibliographicPageStart":"11","bibliographicIssueDates":{"bibliographicIssueDate":"2018-01-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"8"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":185674,"updated":"2025-01-20T00:35:47.863831+00:00","links":{},"created":"2025-01-19T00:52:45.631784+00:00"}