{"created":"2025-01-18T23:32:13.405973+00:00","updated":"2025-01-21T21:26:03.638701+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00074864","sets":["6164:6165:6462:6463"]},"path":["6463"],"owner":"5","recid":"74864","title":["合成ウルフを用いた安全性評価に関する一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2009-10-19"},"_buckets":{"deposit":"995870bc-a0c0-4007-8ec8-a60a607be3dc"},"_deposit":{"id":"74864","pid":{"type":"depid","value":"74864","revision_id":0},"owners":[5],"status":"published","created_by":5},"item_title":"合成ウルフを用いた安全性評価に関する一考察","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"合成ウルフを用いた安全性評価に関する一考察"},{"subitem_title":"A Study on Security Evaluation Using Synthesized WolfSamples","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"生体認証 ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2009-10-19","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"産業技術総合研究所/中央大学"},{"subitem_text_value":"中央大学"},{"subitem_text_value":"産業技術総合研究所"},{"subitem_text_value":"産業技術総合研究所/中央大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Advanced Industrial Science and Technology (AIST)/Chuo University","subitem_text_language":"en"},{"subitem_text_value":"Chuo University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Advanced Industrial Science and Technology (AIST)","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Advanced Industrial Science and Technology (AIST)/Chuo University","subitem_text_language":"en"},{"subitem_text_value":"Chuo Universit","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/74864/files/IPSJ-CSS2009D44.pdf"},"date":[{"dateType":"Available","dateValue":"2011-10-19"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2009D44.pdf","filesize":[{"value":"115.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6e9a62a9-ca06-46e8-b7b6-8fc1b54fa2e8","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2009 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"米澤, 祥子"},{"creatorName":"姜, 玄浩"},{"creatorName":"大塚, 玲"},{"creatorName":"今井, 秀樹"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shoko, Yonezaway","creatorNameLang":"en"},{"creatorName":"Hyunho, Kang","creatorNameLang":"en"},{"creatorName":"Akira, Otsuka","creatorNameLang":"en"},{"creatorName":"Hideki, Imai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"バイオメトリクス認証システムに対し、合成ウルフを用いたセキュリティ評価手法を提案する。本手法では、テスト物体アプローチの生体特徴に関するパラメータを変化させながらウルフを探索し、ウルフ攻撃確率を評価する。本手法を用いると、従来アルゴリズムが公開されたシステムに対して適用されていたウルフ攻撃確率によるセキュリティ評価を、実際の製品に対しても適用できると期待される。","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We show a new approach to the security evaluation for biometric authenticationsystems named \\synthesized wolf\" approach, which focuses on the parameters representingbiometric characteristics. The goal of our appoach is to nd \\wolf\" of the target system bychanging these parameters, and to estimate Wolf Attack Probability (WAP) of the system. Thisapproach comes from \\test object\" approach, which creates a dummy sample from acquiredbiometric samples of target person and checks whether the dummy sample is accepted by thesystem or not. Our approach is expected to be applied for the evaluation of black-box biometricproducts.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2009"}]},"relation_version_is_last":true,"weko_creator_id":"5"},"id":74864,"links":{}}