{"created":"2021-03-01T06:16:11.750042+00:00","id":13271,"links":{},"metadata":{"_buckets":{"deposit":"e5de699f-71f8-4b01-8266-57a359f81684"},"_deposit":{"id":"13271","owners":[],"pid":{"revision_id":0,"type":"depid","value":"13271"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00013271","sets":["1221:1307"]},"author_link":["40202","40203"],"item_13_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2000-11","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"142","bibliographicPageStart":"138","bibliographic_titles":[{"bibliographic_title":"Proceedings of the International Symposium on Principles of Software Evolution"}]}]},"item_13_description_19":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"ISPSE, Kanazawa, Japan, Nov. 2000","subitem_description_type":"Other"}]},"item_13_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In this paper, we propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other systems over the computer network. Because components from the other system are not always enough reliable or safe to act freely in your own system, you should limit their activities to a certain context. Such assumption is based on the sandbox security model. Because such components are largely influenced by the runtime environments, users sometimes lose sight of the abilities and limitations of such components. Therefore, they fail to reuse the components in the right way. We provide a way to specify such properties, so that component users can precisely understand the abilities and limitations.","subitem_description_type":"Abstract"}]},"item_13_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_13_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Proceedings of the International Symposium on Principles of Software Evolution. 138-142 (2000)","subitem_description_type":"Other"}]},"item_13_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Kaijiri, K","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_13_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE Computer Society"}]},"item_13_relation_48":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"10.1109/ISPSE.2000.913231"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/ISPSE.2000.913231","subitem_relation_type_select":"DOI"}}]},"item_13_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]},"item_1627890897769":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaiya, H"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaijiri, K"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"09060138.pdf","filesize":[{"value":"154.8 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"09060138.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/13271/files/09060138.pdf"},"version_id":"05c60cda-85de-4955-bda5-cea74818b9b6"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model","subitem_title_language":"en"}]},"item_type_id":"13","owner":"1","path":["1307"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-10-20"},"publish_date":"2009-10-20","publish_status":"0","recid":"13271","relation_version_is_last":true,"title":["Specifying Runtime Environments and Functionalities of Downloadable Components under the Sandbox Model"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:02:18.261128+00:00"}