{"created":"2021-03-01T06:16:10.345323+00:00","id":13248,"links":{},"metadata":{"_buckets":{"deposit":"c9b2ffc6-fc8b-4993-af65-0047af34228d"},"_deposit":{"id":"13248","owners":[],"pid":{"revision_id":0,"type":"depid","value":"13248"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00013248","sets":["1221:1307"]},"author_link":["40136","40137","40138"],"item_13_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2002","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"264","bibliographicPageStart":"255","bibliographic_titles":[{"bibliographic_title":"Engineering Information Systems in the Internet Context"}]}]},"item_13_description_19":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"The original publication is available at www.springerlink.com","subitem_description_type":"Other"}]},"item_13_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Java is one of the most famous mobile code systems, and its components can be dynamically downloaded from the other computers over the internet. Because such downloaded components are not always reliable, behaviors of each component are restricted according to the application’s policy. However, it is not so easy for the application users or developers to decide the suitable policy. In this paper, we introduce a tool for generating and checking the security policies for Java application. As we deploy Java components spatially on a window of our tool, we can check which component can be executed or not with respect to a set of security policies. In addition, our tool can generate the minimal set of policies to execute all the deployed components.","subitem_description_type":"Abstract"}]},"item_13_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_13_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Engineering Information Systems in the Internet Context. 255-264 (2002)","subitem_description_type":"Other"}]},"item_13_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Kaijiri, K","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_13_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Kluwer Academic Publishers"}]},"item_1627890897769":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaiya, H"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Furukawa, H"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaijiri, K"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"200209-eisic.pdf","filesize":[{"value":"238.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"200209-eisic.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/13248/files/200209-eisic.pdf"},"version_id":"667019be-0c73-46c9-ad14-5534b98a7939"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Java Security"},{"subitem_subject":"Security Policy"},{"subitem_subject":"Mobile Code"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES","subitem_title_language":"en"}]},"item_type_id":"13","owner":"1","path":["1307"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-11-09"},"publish_date":"2009-11-09","publish_status":"0","recid":"13248","relation_version_is_last":true,"title":["SECURITY POLICY CHECKER AND GENERATOR FOR JAVA MOBILE CODES"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:02:21.558811+00:00"}