{"created":"2023-07-25T10:33:21.965605+00:00","id":4740,"links":{},"metadata":{"_buckets":{"deposit":"5d706e26-63bd-4324-8d45-5351ab7625d7"},"_deposit":{"created_by":3,"id":"4740","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4740"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004740","sets":["80:222"]},"author_link":["4675","1176","1174","941","1183"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"A Bounty Hunting-based Copyright Protection System for Website Content(Software and Copyright Protection)(Combating Emerging Threats)"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2003-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicPageEnd":"1982","bibliographicPageStart":"1970","bibliographicVolumeNumber":"44","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"アルゴリズム公開型の電子透かしを利用して,著作者から管理の依頼があったディジタルコンテンツの不正コピーが掲載されている違法ホームページを一般ユーザの協力により発見する仕組みを提案する.すべてのユーザが不正者を見つける「賞金稼ぎ」となりうる本方式によれば,不正者はだれに自分の犯罪を発見されるか分からず,不正者にとって大きな脅威になると思われる.また,世界中には無数のホームページが存在するため,これらすべてを公的機関などが一極集中管理することは事実上,不可能である.提案方式はすべての一般ユーザによる究極の分散チェック機構と位置付けることができ,インターネットにおけるディジタルコンテンツの管理に透した仕組みであるといえよう.本論文では本方式と関連方式を比較し,本方式の有効性を検討するとともに,インターネットにおけるコンテンツ監視に関する問題について考察する.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110002711792","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"03875806","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松下, 哲也"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"曽我, 正和"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"田窪, 昭夫"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"中村, 逸一"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101028011.pdf","filesize":[{"value":"1.5 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101028011.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4740/files/101028011.pdf"},"version_id":"20039fc0-7782-4781-a888-ace9d1c47745"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"賞金稼ぎの仕組みを利用したディジタルコンテンツの監視方式(ソフトウェア・著作権保護)(<特集>新たな脅威に立ち向かうコンピュータセキュリティ技術)","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"賞金稼ぎの仕組みを利用したディジタルコンテンツの監視方式(ソフトウェア・著作権保護)(<特集>新たな脅威に立ち向かうコンピュータセキュリティ技術)"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-10-28"},"publish_date":"2010-10-28","publish_status":"0","recid":"4740","relation_version_is_last":true,"title":["賞金稼ぎの仕組みを利用したディジタルコンテンツの監視方式(ソフトウェア・著作権保護)(<特集>新たな脅威に立ち向かうコンピュータセキュリティ技術)"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:49:44.402839+00:00"}