{"created":"2023-05-15T12:35:12.490346+00:00","id":128,"links":{},"metadata":{"_buckets":{"deposit":"eb5bfc74-d4b5-4604-b8d5-f8561ef92e2c"},"_deposit":{"created_by":2,"id":"128","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"128"},"status":"published"},"_oai":{"id":"oai:kutarr.kochi-tech.ac.jp:00000128","sets":["5"]},"author_link":["458","459"],"item_2_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2009-05-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicPageEnd":"1036","bibliographicPageStart":"1033","bibliographicVolumeNumber":"E92-D","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Information and Systems"}]}]},"item_2_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection.","subitem_description_type":"Abstract"}]},"item_2_publisher_35":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"The Institute of Electronics, Information and Communication Engineers"}]},"item_2_relation_13":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1587/transinf.E92.D.1033","subitem_relation_type_select":"DOI"}}]},"item_2_relation_44":{"attribute_name":"関係URI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"http://search.ieice.org/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://search.ieice.org/","subitem_relation_type_select":"URI"}}]},"item_2_rights_14":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright © 2009 The Institute of Electronics, Information and Communication Engineers"}]},"item_2_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA10826272@@@AA11510321","subitem_source_identifier_type":"NCID"}]},"item_2_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0916-8532@@@1745-1361","subitem_source_identifier_type":"ISSN"}]},"item_2_version_type_18":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"TAKATA, Yoshiaki"}],"nameIdentifiers":[{"nameIdentifier":"458","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"SEKI, Hiroyuki"}],"nameIdentifiers":[{"nameIdentifier":"459","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-02-13"}],"displaytype":"detail","filename":"IEICE_E92-D_5_1033.pdf","filesize":[{"value":"205.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEICE_E92-D_5_1033.pdf","url":"https://kutarr.kochi-tech.ac.jp/record/128/files/IEICE_E92-D_5_1033.pdf"},"version_id":"b7584659-3e98-439e-ae88-73ae646e5699"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"history-based access control","subitem_subject_scheme":"Other"},{"subitem_subject":"stack inspection","subitem_subject_scheme":"Other"},{"subitem_subject":"shallow history automaton","subitem_subject_scheme":"Other"},{"subitem_subject":"expressive power","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Comparison of the Expressive Power of Language-Based Access Control Models","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Comparison of the Expressive Power of Language-Based Access Control Models"}]},"item_type_id":"2","owner":"2","path":["5"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-06-23"},"publish_date":"2011-06-23","publish_status":"0","recid":"128","relation_version_is_last":true,"title":["Comparison of the Expressive Power of Language-Based Access Control Models"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2023-05-15T13:43:59.023197+00:00"}