{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00078025","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"78025","title":["コンパイラとOSの連携によるデータフロー間伝播解析"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"c6dbe4fd-4171-41cb-ba7b-f7c798d3f367"},"_deposit":{"id":"78025","pid":{"type":"depid","value":"78025","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"コンパイラとOSの連携によるデータフロー間伝播解析","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"コンパイラとOSの連携によるデータフロー間伝播解析"},{"subitem_title":"Analysis of Data Spread between Data Flows in Cooperation with Compiler and OS","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"OS・仮想化","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"立命館大学グローバル・イノベーション研究機構"},{"subitem_text_value":"立命館大学情報理工学部"},{"subitem_text_value":"立命館大学情報理工学部"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Ritsumeikan University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/78025/files/IPSJCSS2011130.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011130.pdf","filesize":[{"value":"249.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"1795ff5e-07b5-4d3c-81e1-acd047c99b85","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"樫山, 武浩"},{"creatorName":"瀧本, 栄二"},{"creatorName":"毛利, 公一"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takehiro, Kashiyama","creatorNameLang":"en"},{"creatorName":"Eiji, Takimoto","creatorNameLang":"en"},{"creatorName":"Koichi, Mouri","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"情報漏洩を防止するために,データフローを主体としたアクセス制御を実現するセキュアOSの開発を行っている.これまで,セキュアOSでは,コンパイラにおいて静的解析したデータフロー情報に基づいて,プロセス内における保護データの使用を監視してきた.本稿では,変数間の代入や関数呼出しによって発生するデータフロー間のデータ伝播を動的に解析する手法を提案する.本手法では,実行時情報をもとに,データフロー間の結合状態を動的に決定することにより,変数間や関数を跨ぐ広域なデータフローを細粒度に解析することが可能となる.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We have been developing operating system DF-Salvia which provides mandatory access control based on data flow for the purpose of preventing data leakage. DF-Salvia observes behavior of processes based on data flow information analyzed in compiler. In this paper, method for analyzing data spread between data flows dynamically is described. The proposed method decides bonding state between data flows according to the running state. As a result, it becomes possible for wide-area data flow that steps over variable and functions to be analyzed.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"773","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"768","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"id":78025,"updated":"2025-01-21T20:44:09.637828+00:00","links":{},"created":"2025-01-18T23:33:29.369317+00:00"}