ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "fdc9b107-b160-4d09-b110-5e430dd35748"}, "_deposit": {"id": "5136", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "5136"}, "status": "published"}, "_oai": {"id": "oai:nagoya.repo.nii.ac.jp:00005136", "sets": ["322"]}, "author_link": ["12827", "12828", "12829", "12830", "12831", "12832"], "item_10_alternative_title_19": {"attribute_name": "その他のタイトル", "attribute_value_mlt": [{"subitem_alternative_title": "Protecting Mobile Agents against Malicious Hosts Using Tamper Resistant Hardware", "subitem_alternative_title_language": "en"}]}, "item_10_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2003-06-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "6", "bibliographicPageEnd": "1624", "bibliographicPageStart": "1613", "bibliographicVolumeNumber": "44", "bibliographic_titles": [{"bibliographic_title": "情報処理学会論文誌", "bibliographic_titleLang": "ja"}]}]}, "item_10_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Recentrly, it is getting possible to make simple data sharing and exchage among personal computers by advances in computers and wireless communication technology. However, in the existing technology,once a data has been sent to other hosts, it is impossible to control the redistribution of it. In this paper, we propose a data protecting and management method using mobile agents. However, mobile agent can be tampered by malicious hosts. We propose a mobile agent protection method using tamper resistant hardware for public key encryption. The method enables a flexible data management using mobile agents.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_10_identifier_60": {"attribute_name": "URI", "attribute_value_mlt": [{"subitem_identifier_type": "HDL", "subitem_identifier_uri": "http://hdl.handle.net/2237/6690"}]}, "item_10_publisher_32": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "情報処理学会", "subitem_publisher_language": "ja"}]}, "item_10_rights_12": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "ここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address:  editj\u003cat\u003eipsj.or.jp, please.", "subitem_rights_language": "ja"}]}, "item_10_select_15": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_10_source_id_7": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "03875806", "subitem_source_identifier_type": "PISSN"}]}, "item_10_text_14": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_text_value": "application/pdf"}]}, "item_1615787544753": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "春木, 洋美", "creatorNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "12827", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "HARUKI, HIROYOSHI", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "12828", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "河口, 信夫", "creatorNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "12829", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "KAWAGUCHI, NOBUO", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "12830", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "稲垣, 康善", "creatorNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "12831", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "INAGAKI, YASUYOSHI", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "12832", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2018-02-19"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IPSJ-2003-06-019.pdf", "filesize": [{"value": "461.3 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 461300.0, "url": {"label": "IPSJ-2003-06-019.pdf", "objectType": "fulltext", "url": "https://nagoya.repo.nii.ac.jp/record/5136/files/IPSJ-2003-06-019.pdf"}, "version_id": "d7fbf6f6-a0c8-47cf-8f57-9c5f8782b883"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "jpn"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "耐タンパハードウェアを用いたモバイルエージェント保護手法", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "耐タンパハードウェアを用いたモバイルエージェント保護手法", "subitem_title_language": "ja"}]}, "item_type_id": "10", "owner": "1", "path": ["322"], "permalink_uri": "http://hdl.handle.net/2237/6690", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2006-07-18"}, "publish_date": "2006-07-18", "publish_status": "0", "recid": "5136", "relation": {}, "relation_version_is_last": true, "title": ["耐タンパハードウェアを用いたモバイルエージェント保護手法"], "weko_shared_id": -1}
  1. B200 工学部/工学研究科
  2. B200a 雑誌掲載論文
  3. 学術雑誌

耐タンパハードウェアを用いたモバイルエージェント保護手法

http://hdl.handle.net/2237/6690
http://hdl.handle.net/2237/6690
f0f1a546-6c5d-4fde-96a3-fa032917191b
名前 / ファイル ライセンス アクション
IPSJ-2003-06-019.pdf IPSJ-2003-06-019.pdf (461.3 kB)
Item type 学術雑誌論文 / Journal Article(1)
公開日 2006-07-18
タイトル
タイトル 耐タンパハードウェアを用いたモバイルエージェント保護手法
言語 ja
その他のタイトル
その他のタイトル Protecting Mobile Agents against Malicious Hosts Using Tamper Resistant Hardware
言語 en
著者 春木, 洋美

× 春木, 洋美

WEKO 12827

ja 春木, 洋美

Search repository
HARUKI, HIROYOSHI

× HARUKI, HIROYOSHI

WEKO 12828

en HARUKI, HIROYOSHI

Search repository
河口, 信夫

× 河口, 信夫

WEKO 12829

ja 河口, 信夫

Search repository
KAWAGUCHI, NOBUO

× KAWAGUCHI, NOBUO

WEKO 12830

en KAWAGUCHI, NOBUO

Search repository
稲垣, 康善

× 稲垣, 康善

WEKO 12831

ja 稲垣, 康善

Search repository
INAGAKI, YASUYOSHI

× INAGAKI, YASUYOSHI

WEKO 12832

en INAGAKI, YASUYOSHI

Search repository
アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
権利
言語 ja
権利情報 ここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address:  editj<at>ipsj.or.jp, please.
抄録
内容記述 Recentrly, it is getting possible to make simple data sharing and exchage among personal computers by advances in computers and wireless communication technology. However, in the existing technology,once a data has been sent to other hosts, it is impossible to control the redistribution of it. In this paper, we propose a data protecting and management method using mobile agents. However, mobile agent can be tampered by malicious hosts. We propose a mobile agent protection method using tamper resistant hardware for public key encryption. The method enables a flexible data management using mobile agents.
言語 en
内容記述タイプ Abstract
出版者
言語 ja
出版者 情報処理学会
言語
言語 jpn
資源タイプ
資源タイプresource http://purl.org/coar/resource_type/c_6501
タイプ journal article
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
ISSN
収録物識別子タイプ PISSN
収録物識別子 03875806
書誌情報 ja : 情報処理学会論文誌

巻 44, 号 6, p. 1613-1624, 発行日 2003-06-01
フォーマット
application/pdf
著者版フラグ
値 publisher
URI
識別子 http://hdl.handle.net/2237/6690
識別子タイプ HDL
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 20:26:52.338393
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3