{"id":217064,"links":{},"created":"2025-01-19T01:17:34.291501+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00217064","sets":["1164:3925:10844:10845"]},"path":["10845"],"owner":"44499","recid":"217064","title":["ブロックチェーンインターオペラビリティのセキュリティ評価手法の検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-03-03"},"_buckets":{"deposit":"9f49eea2-6cdf-444e-8266-4e6c00dc93ea"},"_deposit":{"id":"217064","pid":{"type":"depid","value":"217064","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"ブロックチェーンインターオペラビリティのセキュリティ評価手法の検討","author_link":["561584","561587","561583","561585","561586"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ブロックチェーンインターオペラビリティのセキュリティ評価手法の検討"},{"subitem_title":"An Examination of Security Evaluation Method for Blockchain Interoperability","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ・リスク評価","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-03-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"富士通株式会社"},{"subitem_text_value":"富士通株式会社"},{"subitem_text_value":"富士通株式会社"},{"subitem_text_value":"富士通株式会社"},{"subitem_text_value":"富士通株式会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Fujitsu Limited","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/217064/files/IPSJ-CSEC22096028.pdf","label":"IPSJ-CSEC22096028.pdf"},"date":[{"dateType":"Available","dateValue":"2024-03-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC22096028.pdf","filesize":[{"value":"801.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"a53e8d03-0929-45c7-8647-4e590c4fc926","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"長谷川, 悠貴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"萱場, 啓太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"米倉, 裕貴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"東角, 芳樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森永, 正信"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,ブロックチェーン (BC) 間での相互運用性を実現する技術が注目されており,中でも,連携処理の制御や記録を行う BC によって異なる BC 同士を連携する技術 (BCB,Blockchain for Connecting Blockchain) は,より多様な BC との接続や複数 BC 間での複雑な連携処理を実現する技術として特に注目されている.一方,BCB を利用してセキュアなシステムを開発するためには,各種 BCB で異なるセキュリティ上の特徴や想定される脅威を考慮した評価手法が必要となる.そこで本研究では,BCB に関する既存研究から抽出したセキュリティ観点や脅威を,BC のレイヤ分類および脅威分類手法を参考に定義した BCB の 5 つの評価カテゴリ (検証,連携,連携情報の保護,接続 BC の管理,ガバナンス) に分類し,各カテゴリごとに想定される脅威に紐づく 17 の評価項目から成る BCB のセキュリティ評価モデルを提案する.また,本評価モデルを利用して想定されるユースケースのセキュリティを評価し,既存手法による評価結果との比較を行うことで,本評価モデルの有効性を確認する.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-03-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"28","bibliographicVolumeNumber":"2022-CSEC-96"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T15:38:11.995500+00:00"}