WEKO3
アイテム
{"_buckets": {"deposit": "4cb8d7e2-9724-440c-b7e1-e91ec79ef0a2"}, "_deposit": {"id": "12540", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "12540"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00012540", "sets": ["1222"]}, "author_link": ["38300", "38301", "38302"], "item_1628147817048": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_6_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2004-04", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "4", "bibliographicPageEnd": "821", "bibliographicPageStart": "811", "bibliographicVolumeNumber": "E87D", "bibliographic_titles": [{"bibliographic_title": "IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS"}]}]}, "item_6_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers\u0027 goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the goals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification.", "subitem_description_type": "Abstract"}]}, "item_6_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_6_description_31": {"attribute_name": "フォーマット:mimeタイプ", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_6_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. E87D(4):811-821 (2004)", "subitem_description_type": "Other"}]}, "item_6_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_6_link_67": {"attribute_name": "WoS", "attribute_value_mlt": [{"subitem_link_text": "Web of Science", "subitem_link_url": "http://gateway.isiknowledge.com/gateway/Gateway.cgi?\u0026GWVersion=2\u0026SrcAuth=ShinshuUniv\u0026SrcApp=ShinshuUniv\u0026DestLinkType=FullRecord\u0026KeyUT=000220779500003\u0026DestApp=WOS"}]}, "item_6_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG"}]}, "item_6_relation_46": {"attribute_name": "他の資源との関係:URI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "http://search.ieice.org/"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://search.ieice.org/", "subitem_relation_type_select": "URI"}}]}, "item_6_relation_51": {"attribute_name": "異版である", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://ci.nii.ac.jp/naid/110003213945/", "subitem_relation_type_select": "URI"}}]}, "item_6_rights_62": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "copyright©2004 IEICE"}, {"subitem_rights": "本文データは学協会の許諾に基づきCiNiiから複製したものである"}]}, "item_6_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_6_source_id_35": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8532", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_39": {"attribute_name": "NII ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8532", "subitem_source_identifier_type": "ISSN"}]}, "item_6_source_id_40": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA10826272", "subitem_source_identifier_type": "NCID"}]}, "item_6_text_69": {"attribute_name": "wosonly authkey", "attribute_value_mlt": [{"subitem_text_value": "goal oriented requirements analysis; anti-requirements; security policy; access control; Java mobile codes"}]}, "item_6_textarea_68": {"attribute_name": "wosonly abstract", "attribute_value_mlt": [{"subitem_textarea_value": "We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the coals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification."}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kaiya, H"}], "nameIdentifiers": [{"nameIdentifier": "38300", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sasaki, K"}], "nameIdentifiers": [{"nameIdentifier": "38301", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri, K"}], "nameIdentifiers": [{"nameIdentifier": "38302", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "110003213945.pdf", "filesize": [{"value": "1.2 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1200000.0, "url": {"label": "110003213945.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/12540/files/110003213945.pdf"}, "version_id": "b2ea15b1-3828-4506-aa2c-33072f234e4b"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "goal oriented requirements analysis", "subitem_subject_scheme": "Other"}, {"subitem_subject": "anti-requirements", "subitem_subject_scheme": "Other"}, {"subitem_subject": "security policy", "subitem_subject_scheme": "Other"}, {"subitem_subject": "access control", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Java mobile codes", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "A Method to Develop Feasible Requirements for Java Mobile Code Application", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "A Method to Develop Feasible Requirements for Java Mobile Code Application", "subitem_title_language": "en"}]}, "item_type_id": "6", "owner": "1", "path": ["1222"], "permalink_uri": "http://hdl.handle.net/10091/3353", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-15"}, "publish_date": "2009-10-15", "publish_status": "0", "recid": "12540", "relation": {}, "relation_version_is_last": true, "title": ["A Method to Develop Feasible Requirements for Java Mobile Code Application"], "weko_shared_id": -1}
A Method to Develop Feasible Requirements for Java Mobile Code Application
http://hdl.handle.net/10091/3353
http://hdl.handle.net/10091/3353af56cf92-ffd3-46d9-8b6a-16cdd723d394
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2009-10-15 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | A Method to Develop Feasible Requirements for Java Mobile Code Application | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | goal oriented requirements analysis | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | anti-requirements | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | security policy | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | access control | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | Java mobile codes | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_6501 | |||||
タイプ | journal article | |||||
著者 |
Kaiya, H
× Kaiya, H× Sasaki, K× Kaijiri, K |
|||||
信州大学研究者総覧へのリンク | ||||||
氏名 | Kaijiri, K | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html | |||||
出版者 | ||||||
出版者 | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. E87D(4):811-821 (2004) | |||||
書誌情報 |
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 巻 E87D, 号 4, p. 811-821, 発行日 2004-04 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | We propose a method for analyzing trade-off between an environment where a Java mobile code application is running and requirements for the application. In particular, we focus on the security-related problems that originate in low-level security policy of the code-centric style of the access control in Java runtime. As the result of this method, we get feasible requirements with respect to security issues of mobile codes. This method will help requirements analysts to compromise the differences between customers' goals and realizable solutions. Customers will agree to the results of the analysis by this method because they can clearly trace the reasons why some goals are achieved but others are not. We can clarify which functions can be performed under the environment systematically. We also clarify which functions in mobile codes are needed so as to meet the goals of users by goal oriented requirements analysis(GORA). By comparing functions derived from the environment and functions from the goals. we can find conflicts between the environments and the goals, and also find vagueness of the requirements. By resolving the conflicts and by clarifying the vagueness, we can develop bases for the requirements specification. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0916-8532 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA10826272 | |||||
他の資源との関係:URI | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://search.ieice.org/ | |||||
関連名称 | http://search.ieice.org/ | |||||
異版である | ||||||
関連タイプ | isVersionOf | |||||
識別子タイプ | URI | |||||
関連識別子 | http://ci.nii.ac.jp/naid/110003213945/ | |||||
権利 | ||||||
権利情報 | copyright©2004 IEICE | |||||
権利 | ||||||
権利情報 | 本文データは学協会の許諾に基づきCiNiiから複製したものである | |||||
出版タイプ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
WoS | ||||||
表示名 | Web of Science | |||||
URL | http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=ShinshuUniv&SrcApp=ShinshuUniv&DestLinkType=FullRecord&KeyUT=000220779500003&DestApp=WOS |