{"created":"2025-01-19T01:09:56.014067+00:00","updated":"2025-01-19T18:49:03.170244+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00208547","sets":["6164:6165:6462:10428"]},"path":["10428"],"owner":"44499","recid":"208547","title":["KeycloakにおけるOAuth 2.0ベースのセキュリティプロファイルの柔軟な実現方法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-10-19"},"_buckets":{"deposit":"640e95f4-beec-4068-8ad3-527bb5beca14"},"_deposit":{"id":"208547","pid":{"type":"depid","value":"208547","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"KeycloakにおけるOAuth 2.0ベースのセキュリティプロファイルの柔軟な実現方法","author_link":["523553","523551","523550","523552"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"KeycloakにおけるOAuth 2.0ベースのセキュリティプロファイルの柔軟な実現方法"},{"subitem_title":"Flexible Way for Realizing OAuth 2.0 Based Security Profiles on Keycloak","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"OAuth 2.0,Keycloak,Security Profile","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2020-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社 日立製作所"},{"subitem_text_value":"株式会社 日立製作所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/208547/files/IPSJCSS2020119.pdf","label":"IPSJCSS2020119.pdf"},"date":[{"dateType":"Available","dateValue":"2022-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2020119.pdf","filesize":[{"value":"743.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"061c8846-f6e2-43db-a29b-889f15de0fa4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"乗松, 隆志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中村, 雄一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takashi, Norimatsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuichi, Nakamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"OSSであるKeycloakでOAuth 2.0ベースのセキュリティプロファイルを実現するにあたり,本体の改造が必要に必要になり,また設定作業が困難な課題がある.本論文では,その課題を解決し,かつ複数のセキュリティプロファイルの適用と,将来導入されるであろう新たなセキュリティプロファイルの適用を容易に実施できる方法であるClient Policyを提案する.また,Client Policyの実装及びその適用結果について報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We have tried to support OAuth 2.0 based security profiles to Keycloak and found some issues. In this paper, we propose  a flexible method to resolve these issues and also support multiple security profiles and newly introduced ones that might be defined in the future. Finally, we report the result of this method's evaluation.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"858","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2020論文集"}],"bibliographicPageStart":"853","bibliographicIssueDates":{"bibliographicIssueDate":"2020-10-19","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":208547,"links":{}}