ログイン
言語:

WEKO3

  • トップ
  • コミュニティ
  • ランキング
AND
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "c89dd417-20b5-4f75-9b8d-49d8f95bbbf6"}, "_deposit": {"id": "13273", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "13273"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00013273", "sets": ["1221:1307"]}, "author_link": ["40208", "40209", "40210"], "item_13_biblio_info_6": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2006-10", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "132", "bibliographicPageStart": "125", "bibliographic_titles": [{"bibliographic_title": "Proceedings : the Sixth International Conference on Quality Software"}]}]}, "item_13_description_19": {"attribute_name": "\u5185\u5bb9\u8a18\u8ff0", "attribute_value_mlt": [{"subitem_description": "QSIC 2006, Beijing, China, Oct. 2006", "subitem_description_type": "Other"}]}, "item_13_description_20": {"attribute_name": "\u6284\u9332", "attribute_value_mlt": [{"subitem_description": "Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called \u201cPORTAM\u201d for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be avoided. The tool also helps them to decide such kinds of trade-offs. Current version of this tool handles Java mobile code applications, thus users of our tool can easily feel real threats. Although the current version deals only with Java components, the ideas behind the tool can be applied to software in general. We finally report experimental results to confirm the usefulness and the educational effects of this tool.", "subitem_description_type": "Abstract"}]}, "item_13_description_30": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7\uff08\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u7a2e\u985e\uff09", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_13_description_31": {"attribute_name": "\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\uff1amime\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_13_description_5": {"attribute_name": "\u5f15\u7528", "attribute_value_mlt": [{"subitem_description": "Proceedings : the Sixth International Conference on Quality Software. 125-132 (2006)", "subitem_description_type": "Other"}]}, "item_13_link_3": {"attribute_name": "\u4fe1\u5dde\u5927\u5b66\u7814\u7a76\u8005\u7dcf\u89a7\u3078\u306e\u30ea\u30f3\u30af", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_13_publisher_4": {"attribute_name": "\u51fa\u7248\u8005", "attribute_value_mlt": [{"subitem_publisher": "IEEE Computer Society"}]}, "item_13_relation_48": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "10.1109/QSIC.2006.47"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/QSIC.2006.47", "subitem_relation_type_select": "DOI"}}]}, "item_13_rights_62": {"attribute_name": "\u6a29\u5229", "attribute_value_mlt": [{"subitem_rights": "\u00a92006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]}, "item_13_select_64": {"attribute_name": "\u8457\u8005\u7248\u30d5\u30e9\u30b0", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_1627890897769": {"attribute_name": "\u51fa\u7248\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Kaiya,  H"}], "nameIdentifiers": [{"nameIdentifier": "40208", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sasaki,  K"}], "nameIdentifiers": [{"nameIdentifier": "40209", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri,  K"}], "nameIdentifiers": [{"nameIdentifier": "40210", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "27180125.pdf", "filesize": [{"value": "320.7 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 320700.0, "url": {"label": "27180125.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/13273/files/27180125.pdf"}, "version_id": "39f95b57-d02b-44b7-973d-f588127f92e7"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application", "subitem_title_language": "en"}]}, "item_type_id": "13", "owner": "1", "path": ["1221/1307"], "permalink_uri": "http://hdl.handle.net/10091/3363", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-20"}, "publish_date": "2009-10-20", "publish_status": "0", "recid": "13273", "relation": {}, "relation_version_is_last": true, "title": ["PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application"], "weko_shared_id": -1}
  1. 060 工学部
  2. 0603 会議発表資料

PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application

http://hdl.handle.net/10091/3363
12219126-02cf-4518-872e-a22f6309a135
名前 / ファイル ライセンス アクション
27180125.pdf 27180125.pdf (320.7 kB)
Item type 会議発表論文 / Conference Paper(1)
公開日 2009-10-20
タイトル
言語 en
タイトル PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
言語
言語 eng
資源タイプ
資源 http://purl.org/coar/resource_type/c_5794
タイプ conference paper
著者 Kaiya, H

× Kaiya, H

WEKO 40208

Kaiya, H

Search repository
Sasaki, K

× Sasaki, K

WEKO 40209

Sasaki, K

Search repository
Kaijiri, K

× Kaijiri, K

WEKO 40210

Kaijiri, K

Search repository
信州大学研究者総覧へのリンク
氏名 Kaijiri, K
URL http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html
出版者
出版者 IEEE Computer Society
引用
内容記述タイプ Other
内容記述 Proceedings : the Sixth International Conference on Quality Software. 125-132 (2006)
書誌情報 Proceedings : the Sixth International Conference on Quality Software

p. 125-132, 発行日 2006-10
内容記述
内容記述タイプ Other
内容記述 QSIC 2006, Beijing, China, Oct. 2006
抄録
内容記述タイプ Abstract
内容記述 Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called “PORTAM” for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be avoided. The tool also helps them to decide such kinds of trade-offs. Current version of this tool handles Java mobile code applications, thus users of our tool can easily feel real threats. Although the current version deals only with Java components, the ideas behind the tool can be applied to software in general. We finally report experimental results to confirm the usefulness and the educational effects of this tool.
資源タイプ(コンテンツの種類)
内容記述タイプ Other
内容記述 Article
DOI
関連識別子
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/QSIC.2006.47
関連名称
関連名称 10.1109/QSIC.2006.47
権利
権利情報 ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 11:06:31.224894
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Cite as

Export

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by CERN Data Centre & Invenio


Powered by CERN Data Centre & Invenio