{"created":"2023-05-15T12:35:11.732350+00:00","id":117,"links":{},"metadata":{"_buckets":{"deposit":"fdcbb912-9055-494f-b6c4-e54d9d809189"},"_deposit":{"created_by":2,"id":"117","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"117"},"status":"published"},"_oai":{"id":"oai:kutarr.kochi-tech.ac.jp:00000117","sets":["5"]},"author_link":["425","424","426"],"item_2_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-04-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicPageEnd":"858","bibliographicPageStart":"847","bibliographicVolumeNumber":"J91-D","bibliographic_titles":[{"bibliographic_title":"電子情報通信学会論文誌. D, 情報・システム = The IEICE transactions on information and systems"}]}]},"item_2_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"プログラムが望ましくない動作を行うことを防ぐ動的アクセス制御機構として,Java仮想機械等に実装されているスタック検査が広く用いられている.しかし,スタック検査は,実行が完了したメソッド呼出しに関するセキュリティ情報が消失するという問題点をもつ.これを解決するため,実行履歴に基づく各種のアクセス制御機構が提案されている.本論文では,Abadiらのアクセス制御法を形式的に定義したHBACプログラムモデルを提案し,HBACプログラムに対するモデル検査法について考察する.具体的には以下の2点を行う.( 1 ) HBACプログラムに対する検証問題は,現実的な仮定のもとでは多項式時間可解であるが,一般の場合は決定性指数時間完全であることを示す.( 2 ) HBACプログラムの検証におけるいくつかの最適化法を提案する.試作検証ツールを使った簡単な実験により,現実的な時間と領域でHBACプログラムの検証が可能であることを示す.","subitem_description_type":"Abstract"}]},"item_2_publisher_35":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会"}]},"item_2_relation_44":{"attribute_name":"関係URI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"http://search.ieice.org/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://search.ieice.org/","subitem_relation_type_select":"URI"}}]},"item_2_rights_14":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2008電子情報通信学会(IEICE)"}]},"item_2_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1881-0225","subitem_source_identifier_type":"ISSN"}]},"item_2_version_type_18":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"高田, 喜朗"}],"nameIdentifiers":[{"nameIdentifier":"424","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"王, 静"}],"nameIdentifiers":[{"nameIdentifier":"425","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"関, 浩之"}],"nameIdentifiers":[{"nameIdentifier":"426","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-02-13"}],"displaytype":"detail","filename":"IEICE_J91-D_4_847.pdf","filesize":[{"value":"493.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEICE_J91-D_4_847.pdf","url":"https://kutarr.kochi-tech.ac.jp/record/117/files/IEICE_J91-D_4_847.pdf"},"version_id":"207c7153-4b04-422c-8625-3467dd93017f"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"言語ベースセキュリティ","subitem_subject_scheme":"Other"},{"subitem_subject":"スタック検査","subitem_subject_scheme":"Other"},{"subitem_subject":"実行履歴に基づくアクセス制御","subitem_subject_scheme":"Other"},{"subitem_subject":"モデル検査","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"実行履歴に基づくアクセス制御の形式モデルと検証","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"実行履歴に基づくアクセス制御の形式モデルと検証"}]},"item_type_id":"2","owner":"2","path":["5"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-03-30"},"publish_date":"2011-03-30","publish_status":"0","recid":"117","relation_version_is_last":true,"title":["実行履歴に基づくアクセス制御の形式モデルと検証"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2023-05-15T13:44:21.178453+00:00"}