{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233358","sets":["581:11492:11495"]},"path":["11495"],"owner":"44499","recid":"233358","title":["Linking Contexts from Distinct Data Sources in Zero Trust Federation"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-15"},"_buckets":{"deposit":"03968b05-c041-4cb8-88df-ee743e3c1e82"},"_deposit":{"id":"233358","pid":{"type":"depid","value":"233358","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Linking Contexts from Distinct Data Sources in Zero Trust Federation","author_link":["633672","633674","633676","633671","633675","633673"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Linking Contexts from Distinct Data Sources in Zero Trust Federation"},{"subitem_title":"Linking Contexts from Distinct Data Sources in Zero Trust Federation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:well-beingなネットワーク環境構築のためのインターネットと運用技術(推薦論文)] access control, context and zero trust","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2024-03-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Kyoto University"},{"subitem_text_value":"Kyoto University"},{"subitem_text_value":"Kyoto University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyoto University","subitem_text_language":"en"},{"subitem_text_value":"Kyoto University","subitem_text_language":"en"},{"subitem_text_value":"Kyoto University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233358/files/IPSJ-JNL6503005.pdf","label":"IPSJ-JNL6503005.pdf"},"date":[{"dateType":"Available","dateValue":"2026-03-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6503005.pdf","filesize":[{"value":"521.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"96880951-3e88-4f59-8280-cf3044ec8ec1","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masato, Hirai"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Kotani"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuo, Okabe"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masato, Hirai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Kotani","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yasuo, Okabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses the information of users and devices, called context, to verify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA by sharing contexts among participants in the federation. ZTF defines Context Attribute Provider (CAP) as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for verification based on ZTA. For precise verification, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP although collecting contexts is essential to realize ZTF. In this research, as a general method for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.288\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses the information of users and devices, called context, to verify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA by sharing contexts among participants in the federation. ZTF defines Context Attribute Provider (CAP) as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for verification based on ZTA. For precise verification, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP although collecting contexts is essential to realize ZTF. In this research, as a general method for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.32(2024) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.32.288\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"65"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":233358,"updated":"2025-01-19T10:07:24.036874+00:00","links":{},"created":"2025-01-19T01:34:45.142838+00:00"}