WEKO3
アイテム
{"_buckets": {"deposit": "eb5bfc74-d4b5-4604-b8d5-f8561ef92e2c"}, "_deposit": {"created_by": 2, "id": "128", "owners": [2], "pid": {"revision_id": 0, "type": "depid", "value": "128"}, "status": "published"}, "_oai": {"id": "oai:kutarr.kochi-tech.ac.jp:00000128", "sets": ["5"]}, "author_link": ["458", "459"], "item_2_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2009-05-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "5", "bibliographicPageEnd": "1036", "bibliographicPageStart": "1033", "bibliographicVolumeNumber": "E92-D", "bibliographic_titles": [{"bibliographic_title": "IEICE Transactions on Information and Systems"}]}]}, "item_2_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection.", "subitem_description_type": "Abstract"}]}, "item_2_publisher_35": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "The Institute of Electronics, Information and Communication Engineers"}]}, "item_2_relation_13": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1587/transinf.E92.D.1033", "subitem_relation_type_select": "DOI"}}]}, "item_2_relation_44": {"attribute_name": "関係URI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "http://search.ieice.org/"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "http://search.ieice.org/", "subitem_relation_type_select": "URI"}}]}, "item_2_rights_14": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "Copyright © 2009 The Institute of Electronics, Information and Communication Engineers"}]}, "item_2_source_id_11": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA10826272@@@AA11510321", "subitem_source_identifier_type": "NCID"}]}, "item_2_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0916-8532@@@1745-1361", "subitem_source_identifier_type": "ISSN"}]}, "item_2_version_type_18": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "TAKATA, Yoshiaki"}], "nameIdentifiers": [{"nameIdentifier": "458", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "SEKI, Hiroyuki"}], "nameIdentifiers": [{"nameIdentifier": "459", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-02-13"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEICE_E92-D_5_1033.pdf", "filesize": [{"value": "205.6 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 205600.0, "url": {"label": "IEICE_E92-D_5_1033.pdf", "url": "https://kutarr.kochi-tech.ac.jp/record/128/files/IEICE_E92-D_5_1033.pdf"}, "version_id": "b7584659-3e98-439e-ae88-73ae646e5699"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "history-based access control", "subitem_subject_scheme": "Other"}, {"subitem_subject": "stack inspection", "subitem_subject_scheme": "Other"}, {"subitem_subject": "shallow history automaton", "subitem_subject_scheme": "Other"}, {"subitem_subject": "expressive power", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Comparison of the Expressive Power of Language-Based Access Control Models", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Comparison of the Expressive Power of Language-Based Access Control Models"}]}, "item_type_id": "2", "owner": "2", "path": ["5"], "permalink_uri": "http://hdl.handle.net/10173/676", "pubdate": {"attribute_name": "公開日", "attribute_value": "2011-06-23"}, "publish_date": "2011-06-23", "publish_status": "0", "recid": "128", "relation": {}, "relation_version_is_last": true, "title": ["Comparison of the Expressive Power of Language-Based Access Control Models"], "weko_shared_id": -1}
Comparison of the Expressive Power of Language-Based Access Control Models
http://hdl.handle.net/10173/676
http://hdl.handle.net/10173/676882462bf-6c72-457a-b1b3-9ef0206a7276
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2011-06-23 | |||||
タイトル | ||||||
タイトル | Comparison of the Expressive Power of Language-Based Access Control Models | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | history-based access control | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | stack inspection | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | shallow history automaton | |||||
キーワード | ||||||
主題Scheme | Other | |||||
主題 | expressive power | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
TAKATA, Yoshiaki
× TAKATA, Yoshiaki× SEKI, Hiroyuki |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection. | |||||
書誌情報 |
IEICE Transactions on Information and Systems 巻 E92-D, 号 5, p. 1033-1036, 発行日 2009-05-01 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0916-8532@@@1745-1361 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA10826272@@@AA11510321 | |||||
DOI | ||||||
関連タイプ | isIdenticalTo | |||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1587/transinf.E92.D.1033 | |||||
権利 | ||||||
権利情報 | Copyright © 2009 The Institute of Electronics, Information and Communication Engineers | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
出版者 | ||||||
出版者 | The Institute of Electronics, Information and Communication Engineers | |||||
関係URI | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://search.ieice.org/ | |||||
関連名称 | http://search.ieice.org/ |