{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00191456","sets":["581:9322:9331"]},"path":["9331"],"owner":"11","recid":"191456","title":["結託耐性符号を用いた名簿システムの分割攻撃への対応"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-09-15"},"_buckets":{"deposit":"efed947f-98c4-42b5-aa02-1c94a7d1ea4c"},"_deposit":{"id":"191456","pid":{"type":"depid","value":"191456","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"結託耐性符号を用いた名簿システムの分割攻撃への対応","author_link":["441804","441802","441801","441803"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"結託耐性符号を用いた名簿システムの分割攻撃への対応"},{"subitem_title":"A Countermeasure for Dividing-attack on the Address-list Managing System with ACC","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:超スマート社会を支えるコンピュータセキュリティ技術] 結託耐性符号,コンテンツ保護,個人情報保護,電子透かし,不正者追跡","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2018-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"立命館大学大学院情報理工学研究科"},{"subitem_text_value":"立命館大学情報理工学部"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate school of information science and engineering, Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"College of information science and engineering, Ritsumeikan University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/191456/files/IPSJ-JNL5909011.pdf","label":"IPSJ-JNL5909011.pdf"},"date":[{"dateType":"Available","dateValue":"2020-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5909011.pdf","filesize":[{"value":"10.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"54e1c383-ef01-41cd-a172-7f71e70e5cdd","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"木下, 盾"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上原, 哲太郎"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Jun, Kinoshita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsutaro, Uehara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"多くの企業が扱う顧客個人情報は事業活動のためには不可欠のものだが,同時に安全管理の責任が求められる.そのため,利活用できる状態でいかに漏洩を防止するかが課題である.特に内部不正による漏洩は,防止や検知が困難である.そこで,対策として従業員ごとにパターンを変えて名簿へダミー個人情報を埋め込む手法がある.しかし,これは結託攻撃によるダミー個人情報の除去が考えられるため,結託耐性符号の利用が必要である.また,名簿は分割される可能性が高く,分割によって結託耐性符号が除去されることも考えられる.本研究では,結託耐性符号を用いた名簿システムとその分割攻撃への対応手法を提案する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Many of the business firms are utilizing the customer personal information for their business activities. At the same time, they are responsible to prevent leakage. It is a big issue for them to utilize the personal information keeping the safety to prevent the leakage. In particular, it is difficult to prevent ant detect the leakage due to internal fraud. Therefore, there is a method of embedding the dummy personal information to the roster by changing the pattern for each employee as a countermeasure. However, because of the threat of the removal of the dummy personal information by collusion attacks, it is necessary to use a collusion resistant code. Moreover, the customer list is likely to be divided into pieces, it is conceivable to collusion resistance code is removed by the division. In this paper, we propose a countermeasure as the list system using collusion code to the splitting attacks.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1580","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1570","bibliographicIssueDates":{"bibliographicIssueDate":"2018-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"59"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:57:20.541585+00:00","updated":"2025-01-20T00:39:03.725275+00:00","id":191456}