{"id":190244,"updated":"2025-01-20T01:17:43.010138+00:00","links":{},"created":"2025-01-19T00:56:13.529306+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00190244","sets":["6164:6165:6640:9508"]},"path":["9508"],"owner":"11","recid":"190244","title":["自律分散型インターネットセキュリティ基盤のための信頼基盤構成法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-06-21"},"_buckets":{"deposit":"f0871866-e080-4a42-9139-6229a8c77dbc"},"_deposit":{"id":"190244","pid":{"type":"depid","value":"190244","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"自律分散型インターネットセキュリティ基盤のための信頼基盤構成法の提案","author_link":["434822","434820","434819","434823","434825","434824","434827","434821","434826"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"自律分散型インターネットセキュリティ基盤のための信頼基盤構成法の提案"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サイバーセキュリティ,TPM,自律分散型インターネットセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2017-06-21","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"},{"subitem_text_value":"東京電機大学"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/190244/files/IPSJ-DICOMO2017239.pdf","label":"IPSJ-DICOMO2017239.pdf"},"date":[{"dateType":"Available","dateValue":"2019-06-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DICOMO2017239.pdf","filesize":[{"value":"3.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"29"},{"tax":["include_tax"],"price":"0","billingrole":"35"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"37"},{"tax":["include_tax"],"price":"0","billingrole":"36"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"47"},{"tax":["include_tax"],"price":"0","billingrole":"50"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"71bb13a6-8eaa-4262-bd92-b4b1e67d9a4b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"堤, 智昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"石川, 毅"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"芦川, 大地"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"米﨑, 直樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"君山, 博之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"八槇, 博史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上野, 洋一郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐野, 香 佐々木 良一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小林, 浩"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年のIoT機器の発達・増加に伴い,これらを悪用したサイバー攻撃が深刻な問題となっている.特に,DDoS攻撃は,攻撃を受ける側がセキュリティ対策を行っていても,防ぐことができない.それに対応するために,我々は,インターネット全体で取り組むセキュリティを実現するための“自律分散型インターネットセキュリティ(AIS)基盤”を提案している.本稿では,このAIS基盤のトラストを確立するために,AIS基盤を構築する中核機器やAIS基盤内でやり取りされる制御通信を安全に運用するための信頼基盤を提案する.また,信頼基盤の実現可能性を検証するためにTPMシミュレータを用いてプロトタイプシステムを実装し,動作確認を行った.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1653","bibliographic_titles":[{"bibliographic_title":"マルチメディア,分散協調とモバイルシンポジウム2017論文集"}],"bibliographicPageStart":"1644","bibliographicIssueDates":{"bibliographicIssueDate":"2017-06-21","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2017"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}