{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00187319","sets":["6164:6165:6462:9463"]},"path":["9463"],"owner":"11","recid":"187319","title":["Trusted Execution Environment搭載デバイスのためのセキュア空間へのアクセス権限設定法の基礎検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-10-16"},"_buckets":{"deposit":"a15d3d2e-4b6e-4fff-ae17-4b41e7520f6d"},"_deposit":{"id":"187319","pid":{"type":"depid","value":"187319","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Trusted Execution Environment搭載デバイスのためのセキュア空間へのアクセス権限設定法の基礎検討","author_link":["423352","423350","423357","423355","423351","423356","423353","423348","423349","423354"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Trusted Execution Environment搭載デバイスのためのセキュア空間へのアクセス権限設定法の基礎検討"},{"subitem_title":"A Study on Access Control for Devices with Trusted Execution Environments","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"TEE,IoT","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-10-16","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日本電気株式会社セキュリティ研究所"},{"subitem_text_value":"日本電気株式会社セキュリティ研究所"},{"subitem_text_value":"日本電気株式会社セキュリティ研究所"},{"subitem_text_value":"日本電気株式会社セキュリティ研究所"},{"subitem_text_value":"日本電気株式会社セキュリティ研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Security Research Laboratories NEC Corporation","subitem_text_language":"en"},{"subitem_text_value":"Security Research Laboratories NEC Corporation","subitem_text_language":"en"},{"subitem_text_value":"Security Research Laboratories NEC Corporation","subitem_text_language":"en"},{"subitem_text_value":"Security Research Laboratories NEC Corporation","subitem_text_language":"en"},{"subitem_text_value":"Security Research Laboratories NEC Corporation","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/187319/files/IPSJCSS2017144.pdf","label":"IPSJCSS2017144.pdf"},"date":[{"dateType":"Available","dateValue":"2017-10-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2017144.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f3c36f83-db30-4dcd-95a6-47a7c06252cb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"濱本, 亮"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 貴之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森田, 佑亮"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"三好, 一徳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小林, 俊輝"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryo, Hamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takayuki, Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yusuke, Morita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazunori, Miyoshi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshiki, Kobayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"GlobalPlatform によってTrusted Execution Environment (TEE) と呼ばれるハードウェアレベルのセキュリティ機能が定義されており,組み込みデバイス向けのCPUを展開しているARM ではTEEの実装例としてTrustZoneと呼ばれる機能が公開されている.しかし,TEEによって構成されたセキュアなメモリ空間(セキュア空間)はアクセス権限が1種類しか設定できず,アーキテクチャ設計の柔軟に欠ける.そこで本稿では,TEEのセキュア空間が持つ権限を多段階で設定できるアクセス制御の基本設計を提案する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Trusted Execution Environment (TEE), one of the famous security technology provided by hardware, is defined by GlobalPlatform. One of the implementation of TEE for embedded devices, TrustZone, is proposed by ARM. However, secure memory spaces (secure world) which consist of TEE have only one access authority. Therefore, it lacks flexibility for designing of device architecture. In order to solve this issue, this paper proposes a multi-level access control method for TEE's secure world.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2017論文集"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2017-10-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-20T02:21:25.665079+00:00","created":"2025-01-19T00:54:00.008460+00:00","links":{},"id":187319}