{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00198702","sets":["6164:6165:7651:9882"]},"path":["9882"],"owner":"44499","recid":"198702","title":["ハードウェアセキュリティ技術・暗号技術の社会実装における課題"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-08-21"},"_buckets":{"deposit":"72aee60f-c242-4c7d-812a-0c98e7219ceb"},"_deposit":{"id":"198702","pid":{"type":"depid","value":"198702","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ハードウェアセキュリティ技術・暗号技術の社会実装における課題","author_link":["479610","479608","479612","479609","479613","479611"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ハードウェアセキュリティ技術・暗号技術の社会実装における課題"},{"subitem_title":"Identifying bottlenecks on social implementation of Hardware Security and Cryptography","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特別セッション(ハードウェアセキュリティ)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2019-08-21","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"セコム株式会社IS研究所"},{"subitem_text_value":"セコム株式会社IS研究所"},{"subitem_text_value":"セコム株式会社IS研究所"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/198702/files/IPSJ-DAS2019013.pdf","label":"IPSJ-DAS2019013.pdf"},"date":[{"dateType":"Available","dateValue":"2021-08-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DAS2019013.pdf","filesize":[{"value":"1.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"10"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"34639864-31cb-46c3-bc4c-6ef25ad11e8a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"国井, 裕樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"伊達, 浩行"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"伊藤, 忠彦"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Kunii","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroyuki, Date","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tadahiko, Ito","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"IoT機器の爆発的な普及に伴い,IoTセキュリティ技術はより重要性を増す.しかしながら,セキュリティ技術の根幹となるハードウェアセキュリティ技術・暗号技術の導入については,進んでいるとはいいがたい現状である.本稿では,IoTが適用される分野ごとの現状を踏まえた上でユースケースの検討を行い,IoT機器への暗号技術の導入に向けて,IoTセキュリティの社会実装における課題抽出としてハードウェアセキュリティ技術・暗号技術への実装要件を導出した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"With the explosive popularization of IoT devices, the security technology of IoT becomes more important. Howerver, it is hard to say that the introduction of hadware security and cryptographic technology which is the foundamental technology of security is progressing at present. In this paper, based on the current state of each field to which IoT is applied, we have considered sevral use cases for the introduction of hardware security and cryptographic technology into IoT device. Through the use cases, we have derived implementation requirements of hardware security and cryptographic technology for IoT devices as the identification of bottlenecks on social implementation of IoT security.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"68","bibliographic_titles":[{"bibliographic_title":"DAシンポジウム2019論文集"}],"bibliographicPageStart":"63","bibliographicIssueDates":{"bibliographicIssueDate":"2019-08-21","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2019"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":198702,"updated":"2025-01-19T21:55:30.549809+00:00","links":{},"created":"2025-01-19T01:02:52.495278+00:00"}