{"created":"2025-01-18T23:10:55.823407+00:00","updated":"2025-01-22T10:17:54.391022+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00044852","sets":["1164:3925:3941:3945"]},"path":["3945"],"owner":"1","recid":"44852","title":["機能マッピングによるセキュリティ対策状況の把握"],"pubdate":{"attribute_name":"公開日","attribute_value":"2005-03-23"},"_buckets":{"deposit":"e6688c84-125f-499b-8644-44df0426cfc6"},"_deposit":{"id":"44852","pid":{"type":"depid","value":"44852","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"機能マッピングによるセキュリティ対策状況の把握","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"機能マッピングによるセキュリティ対策状況の把握"},{"subitem_title":"Conflict Resolution of the Security Policy by Functional Mapping","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2005-03-23","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"NEC インターネットシステム研究所"},{"subitem_text_value":"NEC インターネットシステム研究所"},{"subitem_text_value":"NEC インターネットシステム研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Internet Systems Research Laboratories NEC Corp.","subitem_text_language":"en"},{"subitem_text_value":"Internet Systems Research Laboratories NEC Corp.","subitem_text_language":"en"},{"subitem_text_value":"Internet Systems Research Laboratories NEC Corp.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/44852/files/IPSJ-CSEC04028066.pdf"},"date":[{"dateType":"Available","dateValue":"2007-03-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC04028066.pdf","filesize":[{"value":"138.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"e16c3378-a42d-4ffc-affc-e910e727c174","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2005 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松田, 勝志"},{"creatorName":"岡城, 純孝"},{"creatorName":"小川, 隆一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Katsushi, MATSUDA","creatorNameLang":"en"},{"creatorName":"Sumitaka, OKAJO","creatorNameLang":"en"},{"creatorName":"Ryuichi, OGAWA","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"トップダウンに策定されたセキュリティポリシーによるセキュリティ対策は上手くいかない場合がある.そのようなセキュリティポリシーは実際に適用するネットワークシステムの構成や利用形態と乖離していることがあるためである.本稿では,セキュリティポリシーとネットワークシステムの構成を対応付けることでセキュリティポリシーの矛盾を検出し,正しいセキュリティポリシーに修正することを支援する方式について述べる.ポリシーの矛盾には,ポリシーと構成の対応関係に起因する表層的な矛盾とセキュリティ的な運用知識に起因する意味的な矛盾があり,提案方式はこれらの矛盾を検出できることを示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Security management with a security policy sometimes do not work, because there is a great difference between the security policy and the topology or usage manners of the network system to which the policy will be applied. In this paper, we describe a method that discovers inconsistencies in the policy by comparing a fragment of the policy with a component of the network system and supports to amend the policy into an exact one. The method can detect two kinds of inconsistencies, namely, a syntactic inconsistency caused by the mapped form of a policy and a topology and a semantic inconsistency caused by the operating knowledge in the security field.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"386","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"381","bibliographicIssueDates":{"bibliographicIssueDate":"2005-03-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"33(2004-CSEC-028)","bibliographicVolumeNumber":"2005"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":44852,"links":{}}