{"id":18977,"updated":"2025-01-22T22:28:40.997941+00:00","links":{},"created":"2025-01-18T22:51:33.958793+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00018977","sets":["1164:1165:1174:1176"]},"path":["1176"],"owner":"1","recid":"18977","title":["XMLデータベースへの型推論を用いた攻撃に対する安全性検証"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-07-12"},"_buckets":{"deposit":"211acc7b-15e1-48a5-adac-ea770d651cc9"},"_deposit":{"id":"18977","pid":{"type":"depid","value":"18977","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"XMLデータベースへの型推論を用いた攻撃に対する安全性検証","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"XMLデータベースへの型推論を用いた攻撃に対する安全性検証"},{"subitem_title":"Security Verification against Attacks Using Type Inference on XML Databases","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2006-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"},{"subitem_text_value":"大阪大学大学院情報科学研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, Osaka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/18977/files/IPSJ-DBS06140026.pdf"},"date":[{"dateType":"Available","dateValue":"2008-07-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DBS06140026.pdf","filesize":[{"value":"401.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"13"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"2fe1236b-7d4e-4750-bb0c-91571683b404","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2006 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高須賀, 史和"},{"creatorName":"橋本, 健二"},{"creatorName":"石原, 靖哲"},{"creatorName":"藤原, 融"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Fumikazu, Takasuka","creatorNameLang":"en"},{"creatorName":"Kenji, Hashimoto","creatorNameLang":"en"},{"creatorName":"Yasunori, Ishihara","creatorNameLang":"en"},{"creatorName":"Toru, Fujiwara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10112482","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"推論攻撃とは,ユーザが許可されている問合せとその実行結果から,許可されていない問合せの実行結果(機密情報)を推論しようとすることである.本稿では,ユーザが許可されている複数の問合せとその結果から,型推論を用いて機密情報の候補を絞り込む攻撃を考える.そしてXMLデータベースへの型推論を用いた攻撃に対する安全性を形式的に検証する手法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e., secret information) from the execution results of queries authorized to the attacker. In this manuscript, attacks using type inference are considered, where an attacker narrows the candidates for the secret information using authorized queries and their execution results. Then, a method of verifying the security against attacks using type inference on XML databases is proposed.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"192","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告データベースシステム(DBS)"}],"bibliographicPageStart":"187","bibliographicIssueDates":{"bibliographicIssueDate":"2006-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"77(2006-DBS-140)","bibliographicVolumeNumber":"2006"}]},"relation_version_is_last":true,"weko_creator_id":"1"}}