{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00083080","sets":["1164:6389:6784:6830"]},"path":["6830"],"owner":"11","recid":"83080","title":["利用方法に応じたリスクの可視化と適切なセキュリティ対策実施のためのアーキテクチャのグランドデザイン"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-07-12"},"_buckets":{"deposit":"880ea70b-3e4a-4910-93c1-912156c1c6e3"},"_deposit":{"id":"83080","pid":{"type":"depid","value":"83080","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"利用方法に応じたリスクの可視化と適切なセキュリティ対策実施のためのアーキテクチャのグランドデザイン","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"利用方法に応じたリスクの可視化と適切なセキュリティ対策実施のためのアーキテクチャのグランドデザイン"},{"subitem_title":"Architecture Design for Visualizing Risks and Implementing Adequate Security","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2012-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"情報通信研究機構"},{"subitem_text_value":"情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/83080/files/IPSJ-SPT12004017.pdf"},"date":[{"dateType":"Available","dateValue":"2100-01-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT12004017.pdf","filesize":[{"value":"890.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"78e4098b-9bbe-4417-b9f2-27d9ed218d87","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Institute of Electronics, Information and Communication Engineers\nThis SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松尾, 真一郎"},{"creatorName":"金岡, 晃"},{"creatorName":"高橋, 健志"},{"creatorName":"三輪, 信介"},{"creatorName":"蓑輪, 正"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Shinichiro, Matsuo","creatorNameLang":"en"},{"creatorName":"Akira, Kanaoka","creatorNameLang":"en"},{"creatorName":"Takeshi, Takahashl","creatorNameLang":"en"},{"creatorName":"Shinsuke, Miwa","creatorNameLang":"en"},{"creatorName":"Tadashi, Minowa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"クラウドやモバイル等の先進的なネットワーク及びネットワークサービスにおいて,個別のサービス利用におけるリスクの可視化から,リスクに応じた適切なセキュリティ対策の実施を行うためのセキュリティアーキテクチャの実現に向けてそのグランドデザインを示す.その要素には,リスクの評価・可視化,情報の交換・発見,知識データベースの構築,プライバシ保護,セキュリティ SLA (Service Level Agreement), セキュリティ技術の安全性検証などが含まれる.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper provides a grand design for realizing security architecture that visualizes risks for individ ual usage of differing services and for deployment security countermeasures based on risks over networks including cloud and mobile.The architecture utilizes the following techniques:risk evaluation and visualization,information exchange and discovery,knowledge base construction,privacy preserving techniques,security SLA,and verification of security techiniques.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2012-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"17","bibliographicVolumeNumber":"2012-SPT-4"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":83080,"updated":"2025-01-21T18:44:57.610468+00:00","links":{},"created":"2025-01-18T23:36:41.047354+00:00"}