{"created":"2025-01-18T23:39:24.570539+00:00","updated":"2025-01-21T16:23:51.811429+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00089659","sets":["6164:6165:7006:7054"]},"path":["7054"],"owner":"11","recid":"89659","title":["セキュアOSと仮想マシンを利用した情報漏洩とウィルス侵入の防止"],"pubdate":{"attribute_name":"公開日","attribute_value":"2005-11-23"},"_buckets":{"deposit":"656cd6be-f730-4e90-8cb4-517201e3499e"},"_deposit":{"id":"89659","pid":{"type":"depid","value":"89659","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"セキュアOSと仮想マシンを利用した情報漏洩とウィルス侵入の防止","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュアOSと仮想マシンを利用した情報漏洩とウィルス侵入の防止"},{"subitem_title":"Prevention of Information Leakage and Virus Infection with use of Secure OS and Virtual Machine","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルチメディア通信と分散処理ワークショップ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2005-11-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"日立ソフトウェアエンジニアリング株式会社"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi Software Engineering Co., Ltd.","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/89659/files/IPSJ-DPSWS2005029.pdf"},"date":[{"dateType":"Available","dateValue":"2005-11-30"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DPSWS2005029.pdf","filesize":[{"value":"443.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"663bc2b7-5214-44e7-b874-63471d5a11b6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2005 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鮫島吉喜"},{"creatorName":"才所, 秀明"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshiki, 8ameshima","creatorNameLang":"en"},{"creatorName":"Hideaki, Saisho","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1344-0640"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"機密情報を扱うWindows環境とインターネットにアクセス可能でウィルス感染の可能性があるWindows環境を,セキュア08と仮想マシンを使って一台のPCに統合した二系統Windowsシステムを報告する.情報を扱う環境を仮想物理レベルから分離したことで,未知のウィルスが現れても,被害はインターネットにアクセス可能なWindows環境に止まり,機密情報がインターネットに漏洩することはない.本稿では,システム概要,セキュァ08を用いた安全性向上策,性能の他,安全性の検討を報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The authors present an integrated system of multiple Windows environments; one Windows environment is used to process classified information, and the other is used to access Internet and may be infected by computer virus. The authors make use of secure OS and virtual machine, and the two Windows environments are virtually separated at the physical level. As a result, the first Windows environment is not infected by virus, nor classified information will be leaked out to Internet, even if the second Windows environment is infected by unknown virus. The authors describe the system architecture, the separation of the two environments with use of the secure OS, performance and security considerations.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"155","bibliographic_titles":[{"bibliographic_title":"マルチメディア通信と分散処理 ワークショップ論文集"}],"bibliographicPageStart":"151","bibliographicIssueDates":{"bibliographicIssueDate":"2005-11-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"19","bibliographicVolumeNumber":"2005"}]},"relation_version_is_last":true,"item_18_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"セキュリティ&フォールトトレランス"}]},"weko_creator_id":"11"},"id":89659,"links":{}}