{"created":"2025-01-18T23:37:43.346551+00:00","updated":"2025-01-21T17:37:24.014934+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00086722","sets":["6164:6165:6462:6909"]},"path":["6909"],"owner":"11","recid":"86722","title":["モデルテストによるセキュリティ分析・設計パターンの適用支援"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-10-23"},"_buckets":{"deposit":"deefa129-f1b5-4894-a0db-44ee79db4e96"},"_deposit":{"id":"86722","pid":{"type":"depid","value":"86722","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"モデルテストによるセキュリティ分析・設計パターンの適用支援","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"モデルテストによるセキュリティ分析・設計パターンの適用支援"},{"subitem_title":"Model-Driven Security Analysis-Design Patterns Application Using Model Testing","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティパターン,モデル駆動開発,モデルテスト","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2012-10-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"株式会社 富士通研究所"},{"subitem_text_value":"信州大学"},{"subitem_text_value":"国立情報学研究所"},{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"早稲田大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Fujitsu Laboratories limited","subitem_text_language":"en"},{"subitem_text_value":"Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Informatics","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/86722/files/IPSJCSS2012087.pdf"},"date":[{"dateType":"Available","dateValue":"2014-10-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2012087.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"58ad4559-fa29-48d2-b716-5766daff8acc","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小橋, 孝紀"},{"creatorName":"大久保, 隆夫"},{"creatorName":"海谷, 治彦"},{"creatorName":"吉岡, 信和"},{"creatorName":"伊永, 祥太"},{"creatorName":"鷲崎, 弘宜"},{"creatorName":"深澤, 良彰"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takanori, Kobashi","creatorNameLang":"en"},{"creatorName":"Takao, Okubo","creatorNameLang":"en"},{"creatorName":"Haruhiko, Kaiya","creatorNameLang":"en"},{"creatorName":"Nobukazu, Yoshioka","creatorNameLang":"en"},{"creatorName":"Shota, Inaga","creatorNameLang":"en"},{"creatorName":"Hironori, Washizaki","creatorNameLang":"en"},{"creatorName":"Yoshiaki, Hukazawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在のソフトウェア開発では開発者が必ずしもセキュリティの専門家ではなく,システムに起こりうる脅威を確認,検討することができていない.本稿ではUMLモデルのシミュレーション環境を用いたモデルテストによる,セキュリティパターンの適用支援を提案する. 本手法を用いる事によりセキュリティに精通しない開発者であっても分析・設計段階でのシステムにおける脆弱性の把握が可能になり,セキュアな設計が可能になる.更に本稿では既存のセキュリティパターンに対し構造・振る舞いを定義し新たに加え用意しておく事で,パターン毎に異なっていた構造の抽象度や表現の仕方を統一し,形式的なパターンの適用を可能にした.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Current software developer is not necessarily an expert in security. So check the possible threat to the system, have not been able to examine. In this paper, we propose Model-Driven security analysis-design patterns application using model testing. By using this method, secure design of analysis and design stages is possible even developers who are not familiar with the security. In addition, to define structure and behavior for existing security patterns uniformity, developers can application patterns formally.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"662","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2012論文集"}],"bibliographicPageStart":"655","bibliographicIssueDates":{"bibliographicIssueDate":"2012-10-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2012"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":86722,"links":{}}