{"updated":"2025-01-21T21:03:27.070922+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00075807","sets":["1:6278:6282"]},"path":["6282"],"owner":"13","recid":"75807","title":["ソフトウェアパターン−時を超えるソフトウェアの道−:3.セキュリティの知識を共有するセキュリティパターン"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-08-15"},"_buckets":{"deposit":"aa22bf54-5a45-465e-a70c-d3955762c938"},"_deposit":{"id":"75807","pid":{"type":"depid","value":"75807","revision_id":0},"owners":[13],"status":"published","created_by":13},"item_title":"ソフトウェアパターン−時を超えるソフトウェアの道−:3.セキュリティの知識を共有するセキュリティパターン","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ソフトウェアパターン−時を超えるソフトウェアの道−:3.セキュリティの知識を共有するセキュリティパターン"},{"subitem_title":"Software Patterns - The Timeless Way of Software - : 3. Industrial Practices for Pattern Oriented Software Development ","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"小特集","subitem_subject_scheme":"Other"}]},"item_type_id":"1","publish_date":"2011-08-15","item_1_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"国立情報学研究所"}]},"item_1_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Informatics","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/75807/files/IPSJ-MGN520931.pdf"},"date":[{"dateType":"Available","dateValue":"2013-08-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MGN520931.pdf","filesize":[{"value":"1.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c99c34bd-c460-4fe0-b3c9-f31eec275e31","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_1_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"吉岡, 信和"}],"nameIdentifiers":[{}]}]},"item_1_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nobukazu, YOSHIOKA","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_1_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116625","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"article"}]},"item_1_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"セキュリティの考慮には専門的知識が必要であり,一般のエンジニアが安全なソフトウェアを開発するのは難しい.個々のセキュリティ機能がいかに安全に作られていても,その設定や使い方が間違っている場合,それがシステムの脆弱性になってしまう.そこを攻撃され,重要な情報が漏洩してしまう可能性があるため,セキュリティは注意深く開発する必要がある.そこで,セキュリティの専門知識を整理し,セキュリティの正しい再利用を促進するためのソフトウェアパターンとして,セキュリティパターンが注目されている.本稿では,セキュリティパターンの技術の研究動向と,今後のセキュリティパターンの展望を解説する.","subitem_description_type":"Other"}]},"item_1_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1139","bibliographic_titles":[{"bibliographic_title":"情報処理"}],"bibliographicPageStart":"1134","bibliographicIssueDates":{"bibliographicIssueDate":"2011-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"52"}]},"relation_version_is_last":true,"weko_creator_id":"13"},"created":"2025-01-18T23:32:49.396273+00:00","id":75807,"links":{}}