{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077962","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77962","title":["Webアプリケーションの安全な実行方式"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"e0027c28-6f0e-4f18-819e-14b5dcf00122"},"_deposit":{"id":"77962","pid":{"type":"depid","value":"77962","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"Webアプリケーションの安全な実行方式","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Webアプリケーションの安全な実行方式"},{"subitem_title":"Secure Execution of Web Application","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ユビキタスセキュリティ(1)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"},{"subitem_text_value":"株式会社富士通研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Fujitsu Laboratories LTD.","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Laboratories LTD.","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Laboratories LTD.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77962/files/IPSJCSS2011067.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011067.pdf","filesize":[{"value":"337.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"91c85ee4-cf89-4f23-967a-d2886da81afc","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中村, 洋介"},{"creatorName":"二村, 和明"},{"creatorName":"伊藤, 栄信"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yosuke, Nakamura","creatorNameLang":"en"},{"creatorName":"Kazuaki, Nimura","creatorNameLang":"en"},{"creatorName":"Hidenobu, Ito","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"スマートフォンにおいて,利用者がマルウェアを含むアプリケーションをインストール,実行してしまう事例が増えている.マルウェアの実行を防ぐには,利用者がアプリのインストール時に表示されるアクセス許可の警告を確認し,アプリ本来の機能に必要ないアクセス許可が含まれていればインストールしないことであるが,これでは利用者のスキルによってしまい全ての利用者がマルウェアの実行を防ぐことは難しい.本報告では,Webアプリを対象とし,マルウェアを含むアプリを実行させながらランタイムで不正なコードのみを実行させない,アプリの安全な実行方式を提案する.そして,スマートフォンを用いて本方式を実装し,その有効性を確認した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"For preventing unwanted behavior by malware in smart phone, it has been taken an approach that user checks the warnings of access permission which are displayed at the time of installation of an application and then user permits the access controls. However because it depends on IT literacy of users, it is doubtful whether it is suitable for all the users. In this paper we propose an approach that is automatically produce an access control list from an application as a Cloud service and run the application with the access controls at smart phone. Then we implemented the proposed approach using Android smartphone and showed the effectiveness.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"396","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"391","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:42:08.369284+00:00","created":"2025-01-18T23:33:26.340295+00:00","links":{},"id":77962}