ログイン
言語:

WEKO3

  • トップ
  • コミュニティ
  • ランキング
AND
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "e5de699f-71f8-4b01-8266-57a359f81684"}, "_deposit": {"id": "13271", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "13271"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00013271", "sets": ["1221:1307"]}, "author_link": ["40202", "40203"], "item_13_biblio_info_6": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2000-11", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "142", "bibliographicPageStart": "138", "bibliographic_titles": [{"bibliographic_title": "Proceedings of the International Symposium on Principles of Software Evolution"}]}]}, "item_13_description_19": {"attribute_name": "\u5185\u5bb9\u8a18\u8ff0", "attribute_value_mlt": [{"subitem_description": "ISPSE, Kanazawa, Japan, Nov. 2000", "subitem_description_type": "Other"}]}, "item_13_description_20": {"attribute_name": "\u6284\u9332", "attribute_value_mlt": [{"subitem_description": "In this paper, we propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other systems over the computer network. Because components from the other system are not always enough reliable or safe to act freely in your own system, you should limit their activities to a certain context. Such assumption is based on the sandbox security model. Because such components are largely influenced by the runtime environments, users sometimes lose sight of the abilities and limitations of such components. Therefore, they fail to reuse the components in the right way. We provide a way to specify such properties, so that component users can precisely understand the abilities and limitations.", "subitem_description_type": "Abstract"}]}, "item_13_description_30": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7\uff08\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u7a2e\u985e\uff09", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_13_description_31": {"attribute_name": "\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\uff1amime\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_13_description_5": {"attribute_name": "\u5f15\u7528", "attribute_value_mlt": [{"subitem_description": "Proceedings of the International Symposium on Principles of Software Evolution. 138-142 (2000)", "subitem_description_type": "Other"}]}, "item_13_link_3": {"attribute_name": "\u4fe1\u5dde\u5927\u5b66\u7814\u7a76\u8005\u7dcf\u89a7\u3078\u306e\u30ea\u30f3\u30af", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_13_publisher_4": {"attribute_name": "\u51fa\u7248\u8005", "attribute_value_mlt": [{"subitem_publisher": "IEEE Computer Society"}]}, "item_13_relation_48": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "10.1109/ISPSE.2000.913231"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/ISPSE.2000.913231", "subitem_relation_type_select": "DOI"}}]}, "item_13_rights_62": {"attribute_name": "\u6a29\u5229", "attribute_value_mlt": [{"subitem_rights": "\u00a92000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]}, "item_13_select_64": {"attribute_name": "\u8457\u8005\u7248\u30d5\u30e9\u30b0", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_1627890897769": {"attribute_name": "\u51fa\u7248\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kaiya,  H"}], "nameIdentifiers": [{"nameIdentifier": "40202", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri,  K"}], "nameIdentifiers": [{"nameIdentifier": "40203", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "09060138.pdf", "filesize": [{"value": "154.8 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 154800.0, "url": {"label": "09060138.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/13271/files/09060138.pdf"}, "version_id": "05c60cda-85de-4955-bda5-cea74818b9b6"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model", "subitem_title_language": "en"}]}, "item_type_id": "13", "owner": "1", "path": ["1221/1307"], "permalink_uri": "http://hdl.handle.net/10091/3365", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-20"}, "publish_date": "2009-10-20", "publish_status": "0", "recid": "13271", "relation": {}, "relation_version_is_last": true, "title": ["Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model"], "weko_shared_id": -1}
  1. 060 工学部
  2. 0603 会議発表資料

Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model

http://hdl.handle.net/10091/3365
38e01838-aa01-400e-8974-81e1fb1fb63e
名前 / ファイル ライセンス アクション
09060138.pdf 09060138.pdf (154.8 kB)
Item type 会議発表論文 / Conference Paper(1)
公開日 2009-10-20
タイトル
言語 en
タイトル Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model
言語
言語 eng
資源タイプ
資源 http://purl.org/coar/resource_type/c_5794
タイプ conference paper
著者 Kaiya, H

× Kaiya, H

WEKO 40202

Kaiya, H

Search repository
Kaijiri, K

× Kaijiri, K

WEKO 40203

Kaijiri, K

Search repository
信州大学研究者総覧へのリンク
氏名 Kaijiri, K
URL http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html
出版者
出版者 IEEE Computer Society
引用
内容記述タイプ Other
内容記述 Proceedings of the International Symposium on Principles of Software Evolution. 138-142 (2000)
書誌情報 Proceedings of the International Symposium on Principles of Software Evolution

p. 138-142, 発行日 2000-11
内容記述
内容記述タイプ Other
内容記述 ISPSE, Kanazawa, Japan, Nov. 2000
抄録
内容記述タイプ Abstract
内容記述 In this paper, we propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other systems over the computer network. Because components from the other system are not always enough reliable or safe to act freely in your own system, you should limit their activities to a certain context. Such assumption is based on the sandbox security model. Because such components are largely influenced by the runtime environments, users sometimes lose sight of the abilities and limitations of such components. Therefore, they fail to reuse the components in the right way. We provide a way to specify such properties, so that component users can precisely understand the abilities and limitations.
資源タイプ(コンテンツの種類)
内容記述タイプ Other
内容記述 Article
DOI
関連識別子
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ISPSE.2000.913231
関連名称
関連名称 10.1109/ISPSE.2000.913231
権利
権利情報 ©2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 11:06:36.614337
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Cite as

Export

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by CERN Data Centre & Invenio


Powered by CERN Data Centre & Invenio