{"created":"2025-01-18T23:31:18.598327+00:00","updated":"2025-01-21T21:59:36.535502+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00073222","sets":["1164:3925:6360:6361"]},"path":["6361"],"owner":"10","recid":"73222","title":["ESGモデルに基づく情報セキュリティ対策の評価支援"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-03-03"},"_buckets":{"deposit":"899935ab-f9ac-4cfe-8eb7-5fd62590776e"},"_deposit":{"id":"73222","pid":{"type":"depid","value":"73222","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"ESGモデルに基づく情報セキュリティ対策の評価支援","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ESGモデルに基づく情報セキュリティ対策の評価支援"},{"subitem_title":"Proposal of evaluation support technique of information security measures with ESG model","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"リスクコミュニケーションと情報セキュリティ対策","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2011-03-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"(株)富士通研究所"},{"subitem_text_value":"(株)富士通研究所"},{"subitem_text_value":"富士通(株)"},{"subitem_text_value":"富士通(株)"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Fujitsu Laboratories Limited.","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Laboratories Limited.","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited.","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Limited.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/73222/files/IPSJ-CSEC11052022.pdf"},"date":[{"dateType":"Available","dateValue":"2013-03-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC11052022.pdf","filesize":[{"value":"662.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"343802f1-1ade-49a6-a4c5-6461b7172568","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"谷口, 浩之"},{"creatorName":"金谷, 延幸"},{"creatorName":"鈴木, 拓也"},{"creatorName":"奥原, 雅之"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroyuki, Taniguchi","creatorNameLang":"en"},{"creatorName":"Nobuyuki, Kanaya","creatorNameLang":"en"},{"creatorName":"Takuya, Suzuki","creatorNameLang":"en"},{"creatorName":"Masayuki, Okuhara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"情報セキュリティ対策を評価するための,セキュリティ統制のモデルを提案する.本モデルは,セキュリティ統制において重要な判断プロセスに着目し,判断に必要な情報の流れで,セキュリティ統制を表記するためのものである.セキュリティ対策の運用現場における統制状況の把握や暗黙的なプロセスとルールの抽出をサポートする.本報告では,モデル定義を示し,セキュリティ対策である運用手順評価へ適用した結果について述べる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose a model and notation of a security control to evaluate information security measures. This model expresses security control by information flow for security judgments. It supports clarification of present situation of security control and extraction of implicit processes and rules. In this report, our model's definition is shown, and application result of a security procedure evaluation is described.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-03-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"22","bibliographicVolumeNumber":"2011-CSEC-52"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"id":73222,"links":{}}