{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233346","sets":["1164:2836:11471:11524"]},"path":["11524"],"owner":"44499","recid":"233346","title":["エッジコンピューティングにおけるリソース認可への自己主権型アイデンティティの適用"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-11"},"_buckets":{"deposit":"82e89dfc-e2db-4875-bf1f-11183413ae40"},"_deposit":{"id":"233346","pid":{"type":"depid","value":"233346","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"エッジコンピューティングにおけるリソース認可への自己主権型アイデンティティの適用","author_link":["633621","633620","633619","633618"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"エッジコンピューティングにおけるリソース認可への自己主権型アイデンティティの適用"},{"subitem_title":"Application of Self-Sovereign Identity to Resource Authorization in Edge Computing","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"認証・認可","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-11","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"KDDI総合研究所"},{"subitem_text_value":"KDDI総合研究所"},{"subitem_text_value":"兵庫県立大学大学院情報科学研究科"},{"subitem_text_value":"九州大学システム情報科学研究院"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI Research, Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI Research, Inc.","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science, University of Hyogo","subitem_text_language":"en"},{"subitem_text_value":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233346/files/IPSJ-DPS24198062.pdf","label":"IPSJ-DPS24198062.pdf"},"date":[{"dateType":"Available","dateValue":"2026-03-11"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPS24198062.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"34"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e2dbad49-d003-49a6-8cb9-dae48e9d1429","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"渡辺, 龍"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"窪田, 歩"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"栗原, 淳"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10116224","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8906","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"著者らはこれまでに,エッジコンピューティングにおける計算資源の割り当てに,インターネット上の代表的な認可手法である OAuth のフローを適用することで,適切に管理できることを確認している.また,近年では,認証,認可を担うデジタルアイデンティティの検討においては,個人の権利(プライバシ)を尊重する,自己主権型アイデンティティの概念とのそのための技術の検討が進んでいる.そこで,本稿では,エッジコンピューティングのリソース認可において,自己主権型アイデンティティの概念を導入した場合の適合性,安全性などに関する検討について報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The authors have previously confirmed that the flow of OAuth, a traditional authorization method on the Internet, can be managed appropriately by applying it to allocating computational resources in edge computing. In addition, in recent years, the concept of self-sovereign identity (SSI), which respects the rights of individuals, and technologies for this purpose have been studied in examining digital identities responsible for authentication and authorization. In this paper, we report on a study of the suitability and security of introducing the concept of SSI as an extension of resource authorization for edge computing.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告マルチメディア通信と分散処理(DPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"62","bibliographicVolumeNumber":"2024-DPS-198"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:34:43.988686+00:00","updated":"2025-01-19T10:07:35.866512+00:00","id":233346}