{"created":"2021-03-01T06:15:28.294570+00:00","id":12558,"links":{},"metadata":{"_buckets":{"deposit":"17c32194-4980-48f4-92b0-0d6583626fa7"},"_deposit":{"id":"12558","owners":[],"pid":{"revision_id":0,"type":"depid","value":"12558"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00012558","sets":["1221:1222"]},"author_link":["38347","38348","38349"],"item_1628147817048":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_6_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application"}]},"item_6_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2003-05-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"60","bibliographicPageEnd":"24","bibliographicPageStart":"17","bibliographicVolumeNumber":"2003","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告 ソフトウェア工学研究会報告"}]}]},"item_6_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"モバイルコードを利用したJavaアプリケーションは,実行する環境下でのセキュリティポリシィによって,その機能を制約される.本稿では,Javaモバイルコードのためのセキュリティポリシィと,アプリケーションの要求仕様とのトレードオフを分析する手法を提案する.我々はすでに,あるセキュリティポリシィ下において,Javaモバイルコードのどのような機能が実行可能か否かを確かめるツールを開発している1).このツールを用いて,あるポリシィ下において,どの機能が実行可能で,どの機能が不可能かを明確にすることができる.我々はゴール指向要求分析手法を用いて,アプリケーションの要求仕様を充足するためには,どのような機能が必要かを導く.ポリシィから得られた実行可能な機能と,要求仕様から得られた実行したい機能を比較することで,ポリシィと要求の衝突を分析したり,要求の曖昧さを明確にしたりすることが可能となる.我々の手法では,衝突や曖昧さを解消するために,ポリシィを変更指針を示す.しかし,ポリシィが変更不可能である場合には,要求の一部を取り下げを勧告する.","subitem_description_type":"Abstract"},{"subitem_description":"We propose a method for analyzing trade-off between security polices for Java mobile codes and requirements for Java application. We assume that mobile codes are downloaded from different sites, they are used in an application on a site, and their functions are restricted by security polices on the site. We clarify which functions can be performed under the policies on the site using our tool. We also charify which functions are needed so as to meet the requirements for the application by goal oriented requirements analysis(GORA). By comparing functions derived from the policies and functions from the requirments, we can find conflicts between the policies and the requirments, and also find vagueness of the requirements. By using our tool and GOAR again, we can decide which policies should be modified so as to meet the requirments. We can also decide which requirements should be abandoned so as to meet policies which can not be changed.","subitem_description_type":"Abstract"}]},"item_6_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_6_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"情報処理学会研究報告 ソフトウェア工学研究会報告. 2003(60):17-24 (2003)","subitem_description_type":"Other"}]},"item_6_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"海尻, 賢二","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_6_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"社団法人情報処理学会"}]},"item_6_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2003 社団法人情報処理学会"},{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。"}]},"item_6_source_id_35":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0919-6072","subitem_source_identifier_type":"ISSN"}]},"item_6_source_id_40":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10112981","subitem_source_identifier_type":"NCID"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"海谷, 治彦"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"佐々木, 宏太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"海尻, 賢二"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"IPSJ-SE03142003.pdf","filesize":[{"value":"172.9 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IPSJ-SE03142003.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/12558/files/IPSJ-SE03142003.pdf"},"version_id":"9f58063f-4c8e-4e02-9abf-c247d9638ddd"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Javaアプリケーションの要求仕様とセキュリティポリシィのトレードオフ分析","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Javaアプリケーションの要求仕様とセキュリティポリシィのトレードオフ分析","subitem_title_language":"ja"}]},"item_type_id":"6","owner":"1","path":["1222"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-10-06"},"publish_date":"2009-10-06","publish_status":"0","recid":"12558","relation_version_is_last":true,"title":["Javaアプリケーションの要求仕様とセキュリティポリシィのトレードオフ分析"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:08:12.756710+00:00"}