{"id":190300,"updated":"2025-01-20T01:16:38.549895+00:00","links":{},"created":"2025-01-19T00:56:16.666004+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00190300","sets":["1164:4088:9383:9489"]},"path":["9489"],"owner":"11","recid":"190300","title":["Vulnerability Is the Plan the Plan Is Death"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-06-21"},"_buckets":{"deposit":"6cf8db38-7f60-4168-a21e-47edd9377719"},"_deposit":{"id":"190300","pid":{"type":"depid","value":"190300","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Vulnerability Is the Plan the Plan Is Death","author_link":["435055","435056"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Vulnerability Is the Plan the Plan Is Death"},{"subitem_title":"Vulnerability Is the Plan the Plan Is Death","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"攻撃検知","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-06-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Cybermedia Center, Osaka University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Cybermedia Center, Osaka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/190300/files/IPSJ-IOT18042007.pdf","label":"IPSJ-IOT18042007.pdf"},"date":[{"dateType":"Available","dateValue":"2020-06-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT18042007.pdf","filesize":[{"value":"916.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5eb7be9c-2016-4b32-9dde-1a477e53bed7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Kashiwazaki"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Kashiwazaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"An author is a spider-like creature who has decided that, since he is intelligent, he will resist the instincts which lead his species through an exceptionally violent life-cycle which they call “the Plan” - including a drop in intelligence during “winter”. Last December, a certain university announced large-scale personal information leak caused on several systems by several unauthorized accesses. Security advisory consulting companies order the university to “strengthen governance in their own institutes”. This paper shows an aftermath of the personal information leak incident in the university and how administration bureau deals with a lot of the vulnerability in the university.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"An author is a spider-like creature who has decided that, since he is intelligent, he will resist the instincts which lead his species through an exceptionally violent life-cycle which they call “the Plan” - including a drop in intelligence during “winter”. Last December, a certain university announced large-scale personal information leak caused on several systems by several unauthorized accesses. Security advisory consulting companies order the university to “strengthen governance in their own institutes”. This paper shows an aftermath of the personal information leak incident in the university and how administration bureau deals with a lot of the vulnerability in the university.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-06-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2018-IOT-42"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}