WEKO3
アイテム
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
http://hdl.handle.net/10091/3363
http://hdl.handle.net/10091/336312219126-02cf-4518-872e-a22f6309a135
名前 / ファイル | ライセンス | アクション |
---|---|---|
27180125.pdf (320.7 kB)
|
|
Item type | 会議発表論文 / Conference Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2009-10-20 | |||||
タイトル | ||||||
タイトル | PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application | |||||
言語 | en | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||
資源タイプ | conference paper | |||||
著者 |
Kaiya, H
× Kaiya, H× Sasaki, K× Kaijiri, K |
|||||
信州大学研究者総覧へのリンク | ||||||
表示名 | Kaijiri, K | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html | |||||
出版者 | ||||||
出版者 | IEEE Computer Society | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | Proceedings : the Sixth International Conference on Quality Software. 125-132 (2006) | |||||
書誌情報 |
Proceedings : the Sixth International Conference on Quality Software p. 125-132, 発行日 2006-10 |
|||||
内容記述 | ||||||
内容記述タイプ | Other | |||||
内容記述 | QSIC 2006, Beijing, China, Oct. 2006 | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called “PORTAM” for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be avoided. The tool also helps them to decide such kinds of trade-offs. Current version of this tool handles Java mobile code applications, thus users of our tool can easily feel real threats. Although the current version deals only with Java components, the ideas behind the tool can be applied to software in general. We finally report experimental results to confirm the usefulness and the educational effects of this tool. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
DOI | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1109/QSIC.2006.47 | |||||
関連名称 | 10.1109/QSIC.2006.47 | |||||
権利 | ||||||
権利情報 | ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |||||
出版タイプ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |