{"updated":"2025-01-19T22:00:13.351317+00:00","links":{},"id":198506,"created":"2025-01-19T01:02:41.407990+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00198506","sets":["1164:3925:9693:9866"]},"path":["9866"],"owner":"44499","recid":"198506","title":["セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-07-16"},"_buckets":{"deposit":"7d62f8ed-8648-4859-8362-76589ee22b37"},"_deposit":{"id":"198506","pid":{"type":"depid","value":"198506","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする","author_link":["478655"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする"},{"subitem_title":"Systematization of Knowledge of Security and Privacy SoK and Survey Papers","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-07-16","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東邦大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Toho University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/198506/files/IPSJ-CSEC19086065.pdf","label":"IPSJ-CSEC19086065.pdf"},"date":[{"dateType":"Available","dateValue":"2021-07-16"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC19086065.pdf","filesize":[{"value":"839.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"056a14e8-2cd8-4219-ad2f-587aac98eb3d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"金岡, 晃"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"特定の分野や技術要素について研究された論文の多くを調べ,アプローチなどの複数観点から研究開発の現状を整理しその先の研究の展望を考えるようなサーベイ論文は,セキュリティやプライバシーの研究分野においても多い.また近年の難関国際会議では,既存の研究を整理し体系化するような作業を Systematization of Knowledge (SoK) 論文として受け入れることが始まっている.これらの論文は新たにこの分野の研究を始める研究者などを助けるなど意義が深い.本稿では,セキュリティとプライバシーに関するサーベイ論文や SoK 論文を概観することで,どういった整理や体系化が行われているかなどサーベイ論文や SoK 論文をメタな視点で体系化することに挑む.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-07-16","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"65","bibliographicVolumeNumber":"2019-CSEC-86"}]},"relation_version_is_last":true,"weko_creator_id":"44499"}}