WEKO3
アイテム
{"_buckets": {"deposit": "c9b2ffc6-fc8b-4993-af65-0047af34228d"}, "_deposit": {"id": "13248", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "13248"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00013248", "sets": ["1307"]}, "author_link": ["40136", "40137", "40138"], "item_13_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2002", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "264", "bibliographicPageStart": "255", "bibliographic_titles": [{"bibliographic_title": "Engineering Information Systems in the Internet Context"}]}]}, "item_13_description_19": {"attribute_name": "内容記述", "attribute_value_mlt": [{"subitem_description": "The original publication is available at www.springerlink.com", "subitem_description_type": "Other"}]}, "item_13_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Java is one of the most famous mobile code systems, and its components can be dynamically downloaded from the other computers over the internet. Because such downloaded components are not always reliable, behaviors of each component are restricted according to the application’s policy. However, it is not so easy for the application users or developers to decide the suitable policy. In this paper, we introduce a tool for generating and checking the security policies for Java application. As we deploy Java components spatially on a window of our tool, we can check which component can be executed or not with respect to a set of security policies. In addition, our tool can generate the minimal set of policies to execute all the deployed components.", "subitem_description_type": "Abstract"}]}, "item_13_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_13_description_31": {"attribute_name": "フォーマット:mimeタイプ", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_13_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "Engineering Information Systems in the Internet Context. 255-264 (2002)", "subitem_description_type": "Other"}]}, "item_13_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_13_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Kluwer Academic Publishers"}]}, "item_13_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "author"}]}, "item_1627890897769": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kaiya, H"}], "nameIdentifiers": [{"nameIdentifier": "40136", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Furukawa, H"}], "nameIdentifiers": [{"nameIdentifier": "40137", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri, K"}], "nameIdentifiers": [{"nameIdentifier": "40138", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "200209-eisic.pdf", "filesize": [{"value": "238.6 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 238600.0, "url": {"label": "200209-eisic.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/13248/files/200209-eisic.pdf"}, "version_id": "667019be-0c73-46c9-ad14-5534b98a7939"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Java Security", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Security Policy", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Mobile Code", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES", "subitem_title_language": "en"}]}, "item_type_id": "13", "owner": "1", "path": ["1307"], "permalink_uri": "http://hdl.handle.net/10091/3435", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-11-09"}, "publish_date": "2009-11-09", "publish_status": "0", "recid": "13248", "relation": {}, "relation_version_is_last": true, "title": ["SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES"], "weko_shared_id": -1}
SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES
http://hdl.handle.net/10091/3435
http://hdl.handle.net/10091/3435c37adb30-be24-48af-999f-84607c105433
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 会議発表論文 / Conference Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2009-11-09 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題 | Java Security | |||||
キーワード | ||||||
主題 | Security Policy | |||||
キーワード | ||||||
主題 | Mobile Code | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_5794 | |||||
タイプ | conference paper | |||||
著者 |
Kaiya, H
× Kaiya, H× Furukawa, H× Kaijiri, K |
|||||
信州大学研究者総覧へのリンク | ||||||
氏名 | Kaijiri, K | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html | |||||
出版者 | ||||||
出版者 | Kluwer Academic Publishers | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | Engineering Information Systems in the Internet Context. 255-264 (2002) | |||||
書誌情報 |
Engineering Information Systems in the Internet Context p. 255-264, 発行日 2002 |
|||||
内容記述 | ||||||
内容記述タイプ | Other | |||||
内容記述 | The original publication is available at www.springerlink.com | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Java is one of the most famous mobile code systems, and its components can be dynamically downloaded from the other computers over the internet. Because such downloaded components are not always reliable, behaviors of each component are restricted according to the application’s policy. However, it is not so easy for the application users or developers to decide the suitable policy. In this paper, we introduce a tool for generating and checking the security policies for Java application. As we deploy Java components spatially on a window of our tool, we can check which component can be executed or not with respect to a set of security policies. In addition, our tool can generate the minimal set of policies to execute all the deployed components. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
出版タイプ | ||||||
出版タイプ | AM | |||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa |