{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00078008","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"78008","title":["国際標準の参照関係に基づくセキュリティ評価方式におけるデータ移行機能の検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"00c6e98a-323f-42c1-b1a6-236dcb6b099c"},"_deposit":{"id":"78008","pid":{"type":"depid","value":"78008","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"国際標準の参照関係に基づくセキュリティ評価方式におけるデータ移行機能の検討","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"国際標準の参照関係に基づくセキュリティ評価方式におけるデータ移行機能の検討"},{"subitem_title":"A Study on Data Conversion Function of Security Evaluation Method Based on Reference Relationships among International Standards","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"リスク分析・セキュリティポリシー","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"創価大学大学院工学研科"},{"subitem_text_value":"創価大学大学院工学研科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Soka University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Soka University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/78008/files/IPSJCSS2011113.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011113.pdf","filesize":[{"value":"239.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"69f1a6dc-d1f3-4752-a169-28ccc73cf598","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"髙橋, 雄志"},{"creatorName":"勅使河原, 可海"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuji, Takahashi","creatorNameLang":"en"},{"creatorName":"Yoshimi, Teshigawara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"セキュリティ認証取得に対し,国際標準等を基準として対象を評価する.組織では,認証取得に向け,基準達成を確認するセキュリティ評価システムが活用されている.本研究ではこれまで,標準の変化に対応するため,個別の評価ツールではなく,評価基準とする標準の変更のみで標準内容や評価対象の変化に対応した評価ツールを実現するプラットフォームの検討を行ってきた.本稿では,この研究の大目的のひとつであるところの異なる基準をもってセキュリティ評価を行う際に個別のツールを用いなければならないという問題の解決についての検討を行った.データの移行については実験を通してその有効的な移行方法について考察を行った.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"To obtain acquisition of security attestation, the target organization is evaluated based on the international standards. In the organizations, the security evaluation systems that confirm standards achievement of the platform for the attestation have been used. In order to correspond to changes of the standards, we have been studying a platform that realizes the evaluation tool corresponding to changes of the standards contents and evaluation targets only by changes of the standards used as evaluation criteria. In this paper, we studied the solution to solve the problem that it was necessary to use an individual tool when security was evaluated with different standards. In addition, we discuss the effective data conversion method through the experiment.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"671","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"666","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:43:36.648459+00:00","created":"2025-01-18T23:33:28.545684+00:00","links":{},"id":78008}