{"created":"2021-03-01T06:16:11.871019+00:00","id":13273,"links":{},"metadata":{"_buckets":{"deposit":"c89dd417-20b5-4f75-9b8d-49d8f95bbbf6"},"_deposit":{"id":"13273","owners":[],"pid":{"revision_id":0,"type":"depid","value":"13273"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00013273","sets":["1221:1307"]},"author_link":["40208","40209","40210"],"item_13_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006-10","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"132","bibliographicPageStart":"125","bibliographic_titles":[{"bibliographic_title":"Proceedings : the Sixth International Conference on Quality Software"}]}]},"item_13_description_19":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"QSIC 2006, Beijing, China, Oct. 2006","subitem_description_type":"Other"}]},"item_13_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the system. Especially, they should be very careful when they use a system with components and/or services provided by third parties. However, there are few methods or tools to learn and confirm such issues. In this paper, we present a supporting tool called “PORTAM” for such users and providers to understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements should be satisfied or the threats should be avoided. The tool also helps them to decide such kinds of trade-offs. Current version of this tool handles Java mobile code applications, thus users of our tool can easily feel real threats. Although the current version deals only with Java components, the ideas behind the tool can be applied to software in general. We finally report experimental results to confirm the usefulness and the educational effects of this tool.","subitem_description_type":"Abstract"}]},"item_13_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_13_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Proceedings : the Sixth International Conference on Quality Software. 125-132 (2006)","subitem_description_type":"Other"}]},"item_13_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Kaijiri, K","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_13_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE Computer Society"}]},"item_13_relation_48":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"10.1109/QSIC.2006.47"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/QSIC.2006.47","subitem_relation_type_select":"DOI"}}]},"item_13_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]},"item_1627890897769":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kaiya, H"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sasaki, K"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaijiri, K"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"27180125.pdf","filesize":[{"value":"320.7 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"27180125.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/13273/files/27180125.pdf"},"version_id":"39f95b57-d02b-44b7-973d-f588127f92e7"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application","subitem_title_language":"en"}]},"item_type_id":"13","owner":"1","path":["1307"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-10-20"},"publish_date":"2009-10-20","publish_status":"0","recid":"13273","relation_version_is_last":true,"title":["PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:02:18.364677+00:00"}