{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00228674","sets":["6164:6165:6462:11379"]},"path":["11379"],"owner":"44499","recid":"228674","title":["分散型の認可とアクセス制御手法の現状と課題"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-10-23"},"_buckets":{"deposit":"f2e632e8-5795-4390-8832-6a5a00c77c3b"},"_deposit":{"id":"228674","pid":{"type":"depid","value":"228674","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"分散型の認可とアクセス制御手法の現状と課題","author_link":["613152","613156","613151","613155","613154","613153"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"分散型の認可とアクセス制御手法の現状と課題"},{"subitem_title":"Current status and issues of decentralized authorization and access control methods","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"アクセスコントロール,認可,分散化,分散台帳技術","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2023-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"KDDI総合研究所"},{"subitem_text_value":"KDDI総合研究所"},{"subitem_text_value":"九州大学大学院システム情報科学研究院"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI Research, Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI Research, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/228674/files/IPSJ-CSS2023061.pdf","label":"IPSJ-CSS2023061.pdf"},"date":[{"dateType":"Available","dateValue":"2025-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2023061.pdf","filesize":[{"value":"366.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6a64e69d-9a65-4c89-bf01-5d9affb67f2e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡辺, 龍"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"窪田, 歩"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ryu, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ayumu, Kubota","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"組織や個人が管理する情報資源への適切な接続を実現するアクセス制御は,ユーザの役割や属性に基づいて,制御を行う手法であり,また,自身が管理する情報へのアクセスを第三者に許可する認可の手法は,情報への限定的な接続を実現する手法である.当初は組織内での資源の保護管理と,アクセス制御に活用されていたが,インターネットの普及に伴い,ネットワークを超えたリソースへのアクセス制御や,異なる組織が管理するリソースへのアクセス許可に利用されるようになった.利用者の利便性と,管理の容易さ,情報集約によるデータ活用が容易なことから,従来は中央集約型のリソース管理でのアクセス制御や認可が主流となっていたが,近年は,中央集約での単一障害点の問題,情報の一極集中による利用者のプライバシ問題などから,分散型や分権型の管理が求められるようになってきている.また,モバイルインフラの発達,IoT の普及により,リソースそのものもネットワーク上に散逸しており,そうしたリソースの管理やアクセスについてはリソース近傍で行う必要があるなど,いっそうの分散化が必要となってきている.近年の分散型の管理手法を支える背景技術に分散型台帳の技術が挙げられる.分散型台帳の技術では,複数のシステムが連携して情報を保有し,常に同期がとられるため,一部のシステムが停止や,故障したとしても,システム全体の稼働への影響を抑制することができる.このため,単一障害点の問題や,情報の一極集約の課題を解決することが容易である.こうした状況を鑑み,本論文では,分散的な認可手法とアクセス制御の仕組みに関する,最新動向として,その技術と将来の課題についてまとめる.\n","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The concept of access control, which restricts access to information resources managed by an organization, is based on the roles or attributes of users. Authorization, which allows third parties to access information managed by an organization, is a method of achieving limited access to information. Initially, to manage resources closed to an organization and to control access, with the spread of the Internet, they have come to be used to control access to resources beyond the network and to authorize access to resources managed by different organizations. Centralized resource management with access control and authorization had been the mainstream due to user convenience, ease of management, and the ability to utilize data through information aggregation. In recent years, however, the SPOF problem caused by centralization and user privacy issues caused by the centralization of information have led to a demand for decentralized management. In addition, with the development of IoT, resources themselves are scattered over the network, and decentralization of resource management and connection to resources is becoming increasingly necessary. The distributed ledger technology is the backbone of distributed management. Since multiple systems are linked and always synchronized, even if one system stops or fails, the impact on the operation of the entire system can be minimized, making it easier to solve the problems of SPOFs and unipolar concentration of information. Considering these current situations, this paper summarizes the latest trends in distributed authorization and access control mechanisms, their technologies, and future issues.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"446","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2023論文集"}],"bibliographicPageStart":"439","bibliographicIssueDates":{"bibliographicIssueDate":"2023-10-23","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:27:48.955802+00:00","updated":"2025-01-19T11:46:03.181373+00:00","id":228674}