{"created":"2023-07-25T10:33:23.472047+00:00","id":4772,"links":{},"metadata":{"_buckets":{"deposit":"2ad928e1-0323-4fc1-a72e-165dac21961c"},"_deposit":{"created_by":3,"id":"4772","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4772"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004772","sets":["80:222"]},"author_link":["1180","4741","941","2781","4733"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Best Match Security : The proposal of a knowledge-based system for selection of security countermeasures according to user disposition"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-07-17","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"71","bibliographicPageEnd":"272","bibliographicPageStart":"267","bibliographicVolumeNumber":"2008","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. CSEC, [コンピュータセキュリティ]"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"あらゆるシステム・ネツトワークがIT化した現在において,情報セキュリティマネジメントの重要性が益々高まっている.一方,セキュリティ意識やサービスの利用環境はユーザで異なるため、画一的なセキュリティ対策を提供するだけではシステムやサービス全体のセキュリティを確保することは難しい.このため,現在のセキュリティ対策はその効果が十分に発揮されているとは言い難く,対策が利用されていないことさえ多い.本研究では,性向,経験,環境の要因を基に,個人ごとに好適なセキュリティ対策を講じるシステムの実現を目指す.本稿ではシステムの基本構成、実装方針、利用例を概観する.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110006863420","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09196072","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中澤, 優美子"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"加藤, 岳久"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"漁田, 武雄"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"山田, 文康"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101104006.pdf","filesize":[{"value":"662.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101104006.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4772/files/101104006.pdf"},"version_id":"c0afe391-2485-4a10-9066-6dfb7d38afed"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Best Match Security : 個人に適したセキュリティ対策を講じるシステムの提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Best Match Security : 個人に適したセキュリティ対策を講じるシステムの提案"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-11-11"},"publish_date":"2010-11-11","publish_status":"0","recid":"4772","relation_version_is_last":true,"title":["Best Match Security : 個人に適したセキュリティ対策を講じるシステムの提案"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:53:11.363465+00:00"}