ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "4cb8d7e2-9724-440c-b7e1-e91ec79ef0a2"}, "_deposit": {"id": "12540", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "12540"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00012540", "sets": ["1222"]}, "author_link": ["38300", "38301", "38302"], "item_1628147817048": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_6_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2004-04", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "4", "bibliographicPageEnd": "821", "bibliographicPageStart": "811", "bibliographicVolumeNumber": "E87D", "bibliographic_titles": [{"bibliographic_title": "IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS"}]}]}, "item_6_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers\u0027 goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the goals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification.", "subitem_description_type": "Abstract"}]}, "item_6_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_6_description_31": {"attribute_name": "フォーマット:mimeタイプ", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_6_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. E87D(4):811-821 (2004)", "subitem_description_type": "Other"}]}, "item_6_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_6_link_67": {"attribute_name": "WoS", "attribute_value_mlt": [{"subitem_link_text": "Web of Science", "subitem_link_url": "http://gateway.isiknowledge.com/gateway/Gateway.cgi?\u0026GWVersion=2\u0026SrcAuth=ShinshuUniv\u0026SrcApp=ShinshuUniv\u0026DestLinkType=FullRecord\u0026KeyUT=000220779500003\u0026DestApp=WOS"}]}, "item_6_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG"}]}, "item_6_relation_46": {"attribute_name": "他の資源との関係:URI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "http://search.ieice.org/"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://search.ieice.org/", "subitem_relation_type_select": "URI"}}]}, "item_6_relation_51": {"attribute_name": "異版である", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://ci.nii.ac.jp/naid/110003213945/", "subitem_relation_type_select": "URI"}}]}, "item_6_rights_62": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "copyright©2004 IEICE"}, {"subitem_rights": "本文データは学協会の許諾に基づきCiNiiから複製したものである"}]}, "item_6_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_6_source_id_35": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8532", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_39": {"attribute_name": "NII ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8532", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_40": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA10826272", "subitem_source_identifier_type": "NCID"}]}, "item_6_text_69": {"attribute_name": "wosonly authkey", "attribute_value_mlt": [{"subitem_text_value": "goal oriented requirements analysis; anti-requirements; security policy; access control; Java mobile codes"}]}, "item_6_textarea_68": {"attribute_name": "wosonly abstract", "attribute_value_mlt": [{"subitem_textarea_value": "We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the coals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification."}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kaiya,  H"}], "nameIdentifiers": [{"nameIdentifier": "38300", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sasaki,  K"}], "nameIdentifiers": [{"nameIdentifier": "38301", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri,  K"}], "nameIdentifiers": [{"nameIdentifier": "38302", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "110003213945.pdf", "filesize": [{"value": "1.2 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1200000.0, "url": {"label": "110003213945.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/12540/files/110003213945.pdf"}, "version_id": "b2ea15b1-3828-4506-aa2c-33072f234e4b"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "goal oriented requirements analysis", "subitem_subject_scheme": "Other"}, {"subitem_subject": "anti-requirements", "subitem_subject_scheme": "Other"}, {"subitem_subject": "security policy", "subitem_subject_scheme": "Other"}, {"subitem_subject": "access control", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Java mobile codes", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "A Method to Develop Feasible Requirements for Java Mobile Code Application", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "A Method to Develop Feasible Requirements for Java Mobile Code Application", "subitem_title_language": "en"}]}, "item_type_id": "6", "owner": "1", "path": ["1222"], "permalink_uri": "http://hdl.handle.net/10091/3353", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-15"}, "publish_date": "2009-10-15", "publish_status": "0", "recid": "12540", "relation": {}, "relation_version_is_last": true, "title": ["A Method to Develop Feasible Requirements for Java Mobile Code Application"], "weko_shared_id": -1}
  1. 060 工学部
  2. 0601 学術論文

A Method to Develop Feasible Requirements for Java Mobile Code Application

http://hdl.handle.net/10091/3353
http://hdl.handle.net/10091/3353
af56cf92-ffd3-46d9-8b6a-16cdd723d394
名前 / ファイル ライセンス アクション
110003213945.pdf 110003213945.pdf (1.2 MB)
Item type 学術雑誌論文 / Journal Article(1)
公開日 2009-10-15
タイトル
言語 en
タイトル A Method to Develop Feasible Requirements for Java Mobile Code Application
言語
言語 eng
キーワード
主題Scheme Other
主題 goal oriented requirements analysis
キーワード
主題Scheme Other
主題 anti-requirements
キーワード
主題Scheme Other
主題 security policy
キーワード
主題Scheme Other
主題 access control
キーワード
主題Scheme Other
主題 Java mobile codes
資源タイプ
資源 http://purl.org/coar/resource_type/c_6501
タイプ journal article
著者 Kaiya, H

× Kaiya, H

WEKO 38300

Kaiya, H

Search repository
Sasaki, K

× Sasaki, K

WEKO 38301

Sasaki, K

Search repository
Kaijiri, K

× Kaijiri, K

WEKO 38302

Kaijiri, K

Search repository
信州大学研究者総覧へのリンク
氏名 Kaijiri, K
URL http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html
出版者
出版者 IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
引用
内容記述タイプ Other
内容記述 IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. E87D(4):811-821 (2004)
書誌情報 IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS

巻 E87D, 号 4, p. 811-821, 発行日 2004-04
抄録
内容記述タイプ Abstract
内容記述 We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers' goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the goals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification.
資源タイプ(コンテンツの種類)
内容記述タイプ Other
内容記述 Article
ISSN
収録物識別子タイプ ISSN
収録物識別子 0916-8532
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AA10826272
他の資源との関係:URI
識別子タイプ URI
関連識別子 http://search.ieice.org/
関連名称 http://search.ieice.org/
異版である
関連タイプ isVersionOf
識別子タイプ URI
関連識別子 http://ci.nii.ac.jp/naid/110003213945/
権利
権利情報 copyright©2004 IEICE
権利
権利情報 本文データは学協会の許諾に基づきCiNiiから複製したものである
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
WoS
表示名 Web of Science
URL http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=ShinshuUniv&SrcApp=ShinshuUniv&DestLinkType=FullRecord&KeyUT=000220779500003&DestApp=WOS
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 11:24:37.423357
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3