{"created":"2025-01-18T23:10:55.959492+00:00","updated":"2025-01-22T10:15:19.842060+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00044855","sets":["1164:3925:3946:3947"]},"path":["3947"],"owner":"1","recid":"44855","title":["機器の認証に基づく安全なVPN構築技術の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2004-12-20"},"_buckets":{"deposit":"94279edb-f50b-4f00-83af-ea1a9c080041"},"_deposit":{"id":"44855","pid":{"type":"depid","value":"44855","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"機器の認証に基づく安全なVPN構築技術の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"機器の認証に基づく安全なVPN構築技術の提案"},{"subitem_title":"The proposal of the safe VPN construction technology based on device authentication","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2004-12-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社NTTデータ"},{"subitem_text_value":"株式会社NTTデータ"},{"subitem_text_value":"株式会社NTTデータ"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"NTT DATA CORPORATION","subitem_text_language":"en"},{"subitem_text_value":"NTT DATA CORPORATION","subitem_text_language":"en"},{"subitem_text_value":"NTT DATA CORPORATION","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/44855/files/IPSJ-CSEC04027001.pdf"},"date":[{"dateType":"Available","dateValue":"2006-12-20"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC04027001.pdf","filesize":[{"value":"63.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c24a8cdf-b170-4110-8a40-03bed1e3daee","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2004 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"星川, 知之"},{"creatorName":"國分, 誠"},{"creatorName":"鎌仲, 裕久"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoyuki, Hoshikawa","creatorNameLang":"en"},{"creatorName":"Makoto, Kunibu","creatorNameLang":"en"},{"creatorName":"Hirohisa, Kamanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在,インターネット上でネットワークセキュリティを向上する技術について,様々な検討が進められている.安全に情報流通を行うためには,利用する人を認証するだけでなく,機器を認証することが必要となっている.特に高度なセキュリティが求められる場合,ICチップの耐タンパ性や認証技術を用いる方法が有効である.VPN(Virtual Private Network)は,インターネット上で安全に情報を授受する方法として利用されている.本稿では,機器とICチップとの連携をおこない,さらに環境情報を用いた機器の認証をおこなうことにより,安全なVPNの構築を実現するモデルを提案し,その有効性を検証する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Today, various examinations are advanced about the technology which improves network security on the Internet. In order to perform safe information circulation, it not only authenticates those who use, but it is necessary to authenticates device. Especially, when advanced security is required, the method using the Tampa-proof nature and authentication technology of IC chip can be considered. VPN (Virtual Private Network) is used as a method of safe information circulation on the Internet. In this paper, by performing cooperation with device and IC chip, and device authentication using environment information further, the model which realizes construction of safe VPN is proposed and the validity is verified.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2004-12-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"129(2004-CSEC-027)","bibliographicVolumeNumber":"2004"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":44855,"links":{}}