{"updated":"2025-01-22T01:32:32.618681+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00065368","sets":["1:5758:5838"]},"path":["5838"],"owner":"10","recid":"65368","title":["情報社会における脆弱性にかかわる研究動向:4.脆弱性を克服するために1.脆弱性にかかわる法的側面について"],"pubdate":{"attribute_name":"公開日","attribute_value":"2005-06-15"},"_buckets":{"deposit":"2e8795e0-6394-41aa-987b-36ffdf6b2e40"},"_deposit":{"id":"65368","pid":{"type":"depid","value":"65368","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"情報社会における脆弱性にかかわる研究動向:4.脆弱性を克服するために1.脆弱性にかかわる法的側面について","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"情報社会における脆弱性にかかわる研究動向:4.脆弱性を克服するために1.脆弱性にかかわる法的側面について"},{"subitem_title":"Research Trends on Vulnerabilities in the AdvancedInformation Society:Legal Aspects of Vulnerabilities","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集","subitem_subject_scheme":"Other"}]},"item_type_id":"1","publish_date":"2005-06-15","item_1_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"弁護士/宇都宮大学講師"}]},"item_1_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The Chambers of Mr. Ikuo TAKAHASHI","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/65368/files/IPSJ-MGN460611.pdf"},"date":[{"dateType":"Available","dateValue":"2007-06-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MGN460611.pdf","filesize":[{"value":"867.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"29d0e608-6ea6-4d06-9776-10159aadd1b7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2005 by the Information Processing Society of Japan"}]},"item_1_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高橋, 郁夫"}],"nameIdentifiers":[{}]}]},"item_1_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ikuo, TAKAHASHI","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_1_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116625","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"article"}]},"item_1_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"脆弱性は、利用者もしくは攻撃者の特異な利用・攻撃の場合に生じる安全性の欠如状態をもさす点で、通常の瑕疵よりも広い概念となる。この概念の違いが、脆弱性を修正すべき義務の法的な位置づけを左右することになる。さらに脆弱性の発見行為について、不正アクセス禁止法の該当性、契約上の制限の問題があるし、脆弱性の公開については、同様に契約上の制限の問題や完全開示論と「責任ある開示」論の衝突、表現の自由のなかでの位置づけの問題がある。特にこの最後の問題に関連して、ソフトウェア等脆弱性関連情報取扱基準は、注目すべきものとなる。","subitem_description_type":"Other"}]},"item_1_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"661","bibliographic_titles":[{"bibliographic_title":"情報処理"}],"bibliographicPageStart":"657","bibliographicIssueDates":{"bibliographicIssueDate":"2005-06-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicVolumeNumber":"46"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"created":"2025-01-18T23:26:27.300073+00:00","id":65368,"links":{}}