{"updated":"2025-01-21T19:20:05.723668+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00081513","sets":["934:1119:6676:6748"]},"path":["6748"],"owner":"11","recid":"81513","title":["情報セキュリティ向上に向けたOS研究の動向"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-03-22"},"_buckets":{"deposit":"39d9fd60-5a86-4579-86df-887c10f00b8f"},"_deposit":{"id":"81513","pid":{"type":"depid","value":"81513","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"情報セキュリティ向上に向けたOS研究の動向","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"情報セキュリティ向上に向けたOS研究の動向"},{"subitem_title":"A Survey of Security Research for Operating Systems","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2012-03-22","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"},{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科/情報通信研究機構"},{"subitem_text_value":"東京大学大学院情報理工学系研究科"},{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security / National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Technology, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/81513/files/IPSJ-TACS0502007.pdf"},"date":[{"dateType":"Available","dateValue":"2014-03-22"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TACS0502007.pdf","filesize":[{"value":"441.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"14"},{"tax":["include_tax"],"price":"0","billingrole":"15"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"d01680e3-3bb6-48ca-abd0-5ca247e03e82","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"橋本, 正樹"},{"creatorName":"安藤, 類央"},{"creatorName":"前田, 俊行"},{"creatorName":"田中, 英彦"}],"nameIdentifiers":[{}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masaki, Hashimoto","creatorNameLang":"en"},{"creatorName":"Ruo, Ando","creatorNameLang":"en"},{"creatorName":"Toshiyuki, Maeda","creatorNameLang":"en"},{"creatorName":"Hidehiko, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11833852","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7829","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,情報システムが社会基盤化しているため,そのセキュリティ耐性向上が急務であるが,一方で,セキュリティ・インシデントの発生数は年々増加している現実がある.本稿では,情報セキュリティを担保する最も基礎的なソフトウェアとしてOSを位置付け,参照モニタの設計要件と対応付けながら,特に,仮想化技術,OSプログラムの検証技術,アクセス制御技術に焦点をあてて近年の研究動向を紹介する.また,各技術について,今後の展望と課題を整理する.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, information systems have become the social infrastructure, so that their security must be improved urgently. In this paper, we introduce the results of the survey of virtualization, operating system verification and access control technologies in association with the design requirements of the reference monitor. Additionally, we show the prospects and challenges for each technology.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"62","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌コンピューティングシステム(ACS)"}],"bibliographicPageStart":"51","bibliographicIssueDates":{"bibliographicIssueDate":"2012-03-22","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"5"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:35:41.119107+00:00","id":81513,"links":{}}