{"created":"2021-03-01T06:16:11.382613+00:00","id":13265,"links":{},"metadata":{"_buckets":{"deposit":"789c484f-090a-4221-82b6-f04adeac95d8"},"_deposit":{"id":"13265","owners":[],"pid":{"revision_id":0,"type":"depid","value":"13265"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00013265","sets":["1221:1307"]},"author_link":["40183","40184","40185","40186"],"item_13_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2003-09","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"358","bibliographicPageStart":"357","bibliographic_titles":[{"bibliographic_title":"Proceedings : 11th IEEE International Requirements Engineering Conference"}]}]},"item_13_description_19":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"RE 2003, Monterey Bay, California, Sep. 2003","subitem_description_type":"Other"}]},"item_13_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_13_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Proceedings : 11th IEEE International Requirements Engineering Conference. 357-358 (2003)","subitem_description_type":"Other"}]},"item_13_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Kaijiri, K","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_13_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE Computer Society"}]},"item_13_relation_48":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"10.1109/ICRE.2003.1232785"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/ICRE.2003.1232785","subitem_relation_type_select":"DOI"}}]},"item_13_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]},"item_1627890897769":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaiya, H"}],"nameIdentifiers":[{"nameIdentifier":"40183","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Sasaki, K"}],"nameIdentifiers":[{"nameIdentifier":"40184","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Maebashi, Y"}],"nameIdentifiers":[{"nameIdentifier":"40185","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Kaijiri, K"}],"nameIdentifiers":[{"nameIdentifier":"40186","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"19800357.pdf","filesize":[{"value":"55.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"19800357.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/13265/files/19800357.pdf"},"version_id":"c9310220-c1ea-4e5d-a601-f36ebb3bce24"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application","subitem_title_language":"en"}]},"item_type_id":"13","owner":"1","path":["1307"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-10-27"},"publish_date":"2009-10-27","publish_status":"0","recid":"13265","relation_version_is_last":true,"title":["Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:02:22.730385+00:00"}