{"created":"2023-05-15T08:44:00.228280+00:00","id":9199,"links":{},"metadata":{"_buckets":{"deposit":"79fd59dd-7f6d-469f-80a0-01d2b77779f5"},"_deposit":{"created_by":13,"id":"9199","owners":[13],"pid":{"revision_id":0,"type":"depid","value":"9199"},"status":"published"},"_oai":{"id":"oai:uec.repo.nii.ac.jp:00009199","sets":["6"]},"author_link":["24819","24298","24290","25209"],"control_number":"9199","item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-03-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicPageEnd":"857","bibliographicPageStart":"842","bibliographicVolumeNumber":"45","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌","bibliographic_titleLang":"ja"}]}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"柔軟な分散システムを構築する技術としてモバイルエージェントが注目されてきているが,現在その開発方法論とセキュリティへの考慮が課題となっている.本論文では,セキュリティを考慮しながら,段階的にモバイルエージェントシステムを設計する方法論を提案する.この方法論は,セキュリティを考慮したパターンをコストの観点から適用するのが大きな特徴である.これにより,安全性の観点から適切な分散システムを構築が可能となる.","subitem_description_type":"Abstract"},{"subitem_description":"Though the agent technology is attracting more attention,mobile agents suffer from insufficiencies in the area ofdevelopmental methodology, and security.In this paper, we propose a methodology thatsupports the step by step development of mobile agent systems whileensuring consideration of security.The methodology revolves around the use of patterns with cost that take theseissues into account.This allow us to develop appropriate distributed system in security point of view.","subitem_description_type":"Abstract"}]},"item_10001_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_10001_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://id.nii.ac.jp/1001/00010950/","subitem_relation_type_select":"URI"}}]},"item_10001_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2004 Information Processing Society of Japan. 本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。"}]},"item_10001_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_10001_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"吉岡, 信和","creatorNameLang":"ja"},{"creatorName":"ヨシオカ, ノブカズ","creatorNameLang":"ja-Kana"},{"creatorName":"Yoshioka, Nobukazu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"田原, 康之","creatorNameLang":"ja"},{"creatorName":"タハラ, ヤスユキ","creatorNameLang":"ja-Kana"},{"creatorName":"Tahara, Yasuyuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大須賀, 昭彦","creatorNameLang":"ja"},{"creatorName":"オオスガ, アキヒコ","creatorNameLang":"ja-Kana"},{"creatorName":"Ohsuga, Akihiko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"本位田, 真一","creatorNameLang":"ja"},{"creatorName":"ホンイデン, シンイチ","creatorNameLang":"ja-Kana"},{"creatorName":"Honiden, Shinichi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-05-10"}],"displaytype":"detail","filename":"IPSJ-JNL4503020.pdf","filesize":[{"value":"886.8 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IPSJ-JNL4503020","url":"https://uec.repo.nii.ac.jp/record/9199/files/IPSJ-JNL4503020.pdf"},"version_id":"4d0d5e6a-15ac-4bf2-a45a-e27ed7957248"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"パターンを用いたセキュアなモバイルエージェントシステム設計法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"パターンを用いたセキュアなモバイルエージェントシステム設計法","subitem_title_language":"ja"},{"subitem_title":"A Design Method for Secure Mobile Agent System Using Patterns","subitem_title_language":"en"}]},"item_type_id":"10001","owner":"13","path":["6"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-05-10"},"publish_date":"2019-05-10","publish_status":"0","recid":"9199","relation_version_is_last":true,"title":["パターンを用いたセキュアなモバイルエージェントシステム設計法"],"weko_creator_id":"13","weko_shared_id":-1},"updated":"2024-03-01T05:18:35.144705+00:00"}