{"created":"2025-01-18T23:11:18.291149+00:00","updated":"2025-01-22T10:01:37.129644+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00045339","sets":["1164:3925:3966:3970"]},"path":["3970"],"owner":"1","recid":"45339","title":["オブジェクト指向システムにおけるアクセス制御モデル"],"pubdate":{"attribute_name":"公開日","attribute_value":"2000-03-21"},"_buckets":{"deposit":"529f9fa0-d87e-469e-91a3-fcb66fc2d954"},"_deposit":{"id":"45339","pid":{"type":"depid","value":"45339","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"オブジェクト指向システムにおけるアクセス制御モデル","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"オブジェクト指向システムにおけるアクセス制御モデル"},{"subitem_title":"Access Control Model in Object - Oriented Systems","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2000-03-21","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学理工学部情報システム工学科"},{"subitem_text_value":"東京電機大学理工学部情報システム工学科"},{"subitem_text_value":"東京電機大学理工学部情報システム工学科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Computers and Systems Engineering Tokyo Denki University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/45339/files/IPSJ-CSEC99008015.pdf"},"date":[{"dateType":"Available","dateValue":"2002-03-21"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC99008015.pdf","filesize":[{"value":"644.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"20aa4776-3902-4674-aa23-41b8debfbd5d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2000 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"井崎, 慶之"},{"creatorName":"田中, 勝也"},{"creatorName":"滝沢, 誠"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Keiji, Izaki","creatorNameLang":"en"},{"creatorName":"Katsuya, Tanaka","creatorNameLang":"en"},{"creatorName":"Makoto, Takizawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本論文では、安全なオブジェクトシステムを実現するためのアクセス制御モデルについて論じる。オブジェクトは、オブジェクトがサポートするメソッドを通して操作される。オブジェクトには、クラスとインスタンスの二種があり、オブジェクトはis-aとPart-ofにより、階層的に構成される。また、メソッドは入れ子な形式により呼び出される。本論文では、オブジェクト指向システム上の新しいアクセス制御モデルについて述べる。","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The authors discuss a discretional access control model to realize secure object-oriented systems. An object is manipulated only through methods supported by the object. There are two types of objects, i.e. classes and instances. The objects are hierarchically structured in generalization (is-a) and aggregation (part-of) relations. In addition, methods are invoked in a nested manner. We discuss how the access rights are inherited to classes and instance objects in the hierarchical structure.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"86","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"81","bibliographicIssueDates":{"bibliographicIssueDate":"2000-03-21","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"30(1999-CSEC-008)","bibliographicVolumeNumber":"2000"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":45339,"links":{}}