$\mathrm{i}\mathrm{d}$ 15 ) Authorization ( ) Accounting ( ) UNIX Authentication ID Authorization Accounting $\sim-$ UNIX Authentication BSD Flat Data

Size: px
Start display at page:

Download "$\mathrm{i}\mathrm{d}$ 15 ) Authorization ( ) Accounting ( ) UNIX Authentication ID Authorization Accounting $\sim-$ UNIX Authentication BSD Flat Data"

Transcription

1 2})$ $ \ulcorner^{-}$ Central Authentication and Authorization Service -Web Applicatim - (Hisashi NAITO) (Shoji KAJITA) Graduate School of Mathematics Information Technology Center Nagoya University Nagoya University naito@mathnagoya-uacjp kajita@nagoya-ujp (Web Applicafion) $\mathrm{y}^{\gamma}\mathrm{a}1\mathrm{e}$ Central Authentication Service (CAS) $(\mathrm{c}\mathrm{a}\mathrm{s}^{\prime Central Autbentication and Authorization Service Authentication and Authorization Service 2005 $\text{ }$ (Web ) 1 ( ) ) Solution 11 $-\cdot-\wedge$ AAA7 3 Authentication ( ) ( ( IDD

2 $\mathrm{i}\mathrm{d}$ 15 ) Authorization ( ) Accounting ( ) UNIX Authentication ID Authorization Accounting $\sim-$ UNIX Authentication BSD Flat Database ( /e ) $\mathrm{c}/\mathrm{p}\mathrm{a}\mathrm{s}\mathrm{s}\mathrm{w}\mathrm{d}$ UNIX $\mathrm{i}_{-d}\mathrm{d}\mathrm{a}\mathrm{p}$ NIS PAM 12 ( ) Authentication 1 URL ( - ) $\mathrm{i}\mathrm{d}$ - 2 CGUServlet Apache httpd server hccpdconf htaccess $\mathrm{m}\mathrm{o}\mathrm{d}$ ldap- Basic Authentication LDAP Authentication $\mathrm{s}\mathrm{e}\mathrm{r}1^{j}1\mathrm{e}\mathrm{t}$ CGI session at once CGI Servlet Authentication ( Authentication $\mathrm{i}\overline{\mathrm{d}}$ ( ) httpd

3 18 $(\mathrm{h}\mathrm{i}\mathrm{d}\mathrm{d}\mathrm{e}\mathfrak{n})\mathrm{u}\mathrm{r}\mathrm{l}$ Cookie Java Servlet API Web Shopping Site $\backslash$ 13 ID I Single Sign On $\mathrm{c}\mathrm{h}\mathrm{a}\mathrm{n}\iota \mathrm{i}\mathrm{e}\mathrm{l} \backslash$ $\zeta_{\backslash }$ Chalmel Authorization

4 $\}\overline{\mathrm{p}}\mathrm{i}\mathrm{g}\mathrm{u}\mathrm{r}\mathrm{e}1\text{ ^{}\backslash ^{\backslash }}t3$ 17 $ \wedge$ Central Authentication Service 2 Central Authentication Service &ts 1 $\text{ }$ 2 3 Authentication Authorization Central Authentication aild Authorization Yale Service Service Central $\mathrm{a}\iota:\mathrm{t}\mathrm{h}\mathrm{e}\mathfrak{n}\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{a}\mathrm{t}\mathrm{i}\mathrm{o}\mathrm{n}$ 21 Central Authentication Service Yale ITS Technology&Planning 1 2 Central Authentication Service (CAS) (See $)$ [1] CAS CAS CGI $J\backslash ^{\backslash }\backslash$ $\text{ }\backslash$ Figure $\mathrm{a}\mathrm{p}\mathrm{i}23$ CAS Java Servlet $\text{ }$ 2 CAS \beta ( LDAP Oracle 1 ) CAS CAS Figure 2 2 LDAP \ 2 Tom ca[

5 $\iota\epsilon$ $\tau \mathrm{s}\mathrm{t}$ URL $\backslash$ $\cdot$ Figure 1Figure 2 21I CAS (1) CAS 1 CAS Service Ticket ( $\mathrm{s}\mathrm{t} $ ) URL (Figure 3-1 p7) 2 3 CAS $/\backslash$ CAS J\ (Figure 3-2a) $\sim\mathrm{t}\mathrm{g}\mathrm{c} \backslash$ $C\mathrm{o}\mathrm{o}\mathrm{k}\mathrm{i}\mathrm{e}$ 3 CAS Ticket Validation ( ) CAS $P\backslash$ $\cdot$ Selwice Paramete-r URL CAS Service Parameter - URL( $\text{ }$ ) 4 TGC $3arrow 2\mathrm{b}$ $\text{ }$ (Figure ) TGC (Figure 4-3p7) 5 TGC TGC CAS $\mathrm{t}i\mathrm{r}\mathrm{i}_{\lrcorner}\nearrow$ $/\backslash$ CAS $\mathrm{s} \mathrm{t}$ (Figure 4-4) $\mathrm{s}7^{\cdot}$ 6 CAS (Figure 5-5a p7) 7 CAS ( ) (Figure S-5b) 8 CAS (Web ) (Figure 5-6) 6

6 ^{\mathrm{o}}7_{\backslash }$?ticket 18 $\mathrm{a}\mathrm{c}$ $//\mathrm{f}\mathrm{o}\mathrm{o}$ URL https: nagoya-u $\mathrm{j}\mathrm{p}/$ \mathrm{u}\mathrm{a}\mathrm{c}$ https: $//\mathrm{c}\mathrm{a}\mathrm{s}\mathrm{n}\mathrm{a}g\mathrm{o}y\mathrm{a}rightarrow 1 ( ) URL $\mathrm{u}\mathrm{r}\mathrm{l}$ \mathrm{c}\mathrm{a}\mathrm{s}$ )$\mathrm{p}/\mathrm{a}\mathrm{p}\mathrm{p}/\backslash URL https: $//\mathrm{f}\mathrm{o}\mathrm{o}$ $\mathrm{a}\mathrm{c}\mathrm{j}\mathrm{p}/\mathrm{a}\mathrm{p}\mathrm{p}/$ nagoya-u %3Fparaml =value1%2 $6\mathrm{p}\mathrm{a}\mathrm{r}\mathrm{a}\mathrm{m}2=\mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}2$ $=\mathrm{s}\mathrm{t}-$ XXXXXX 2 xxxxxx URL ticket (Figure 3-1) Java ScIi[lt (Figure 3-2a) 3 CAS (TGC) $r\backslash casnagoya-u $\mathrm{a}\mathrm{c}$ ip $\mathrm{t}\mathrm{g}\mathrm{c}$ -XXXXXX ON $\sim-\sim\cdot\cdot--\mathrm{r}\cdot-\cdot\wedge$ $-rightarrow$ $arrow\backslash \sim$ 4 5 (Figure 4-4) 6 CAS (Figure 5-5a P7) 7 6 CAS ticket (Figure 5-5b) $\mathrm{x}\grave{\downarrow}\mathrm{j} \mathrm{l}$ $\mathrm{f}\mathrm{i}\mathrm{g}\mathrm{u}\mathrm{r}\epsilon 6$ 8 CAS 4 (CAS ) $\overline{3}\sim XML netid( $\mathrm{i}\mathrm{d}$) (Figure 6$) 4 XML

7 $\mathrm{f}\mathrm{i}_{b}\sigma \mathrm{u}\mathrm{r}\mathrm{e}3$ $\cdot\cdot\cdot\cdot\ovalbox{\tt\small REJECT}\backslash _{\ddot{\mathrm{a}}}\re \mathrm{p}\cdoti\tau\cdot\cdot\ovalbox{\tt\small REJECT}_{\acute{\phi}}\dot{X}\cdot\backslash i\#\mathrm{f}\cdot\cdot\cdot\cdot\cdotj$ 20 :CAS 1) Figure 4: CAS (2) Figure 5: CAS (3) $\mathrm{t}\mathrm{g}\mathrm{c}/\mathrm{s}\mathrm{t}$ CAS remain $\mathrm{i}\mathrm{n}\mathrm{g}-\mathrm{t}\mathrm{i}\mathrm{m}\mathrm{e}$: 10 Figure 7: CAS $21\underline{?}$ CAS CAS 2 $\star$ Ticket Granting Cookie ( ) Session Once 3 TGCd 5 Session Once $\mathrm{f}\mathrm{g}\mathrm{c}$ CAS

8 $\dot{\mathrm{b}}\mathrm{s}\mathrm{t}$ \mathrm{t}$ $1_{J}$ $\mathrm{a}$ 21 $\star$ CAS CAS Service Ticket ( ) URL CAS $\mathrm{e}$ 6 One Tim Ticket $\star$ $\star$ CAS CAS 2 Login Servlet TGC TGC Validation Servlet $\star$ Logout Servlet TGC TGC CAS TGC $\mathrm{t}\mathrm{i}\mathrm{m}\iota0\iota\iota 7 Session $\cdot$- 8 CAS TGC Man-in-bJiddle Attack CAS URL (Java Script) Web CAS 213 CAS (2) CAS $\backslash \backslash \backslash$ \tilde -^ -- CAS TGC $7\backslash \backslash CAS \backslash$ $\mathrm{o}\mathrm{u} \backslash$ Single SigIl CAS SSL Layer CAS 1 1 https \acute \ --X0\supset TGC TGC -[ $\not\in\wedge \mathrm{g}^{\mathrm{t}}$ 7 1 CAS TGC TGC 8 1

9 $\#\mathrm{t}\mathrm{f}\#$ CAS \mathrm{v}\mathrm{e}\mathrm{l}\mathrm{c}\mathrm{o}\mathrm{m}\mathrm{e}$ Page $\mathrm{d}$ $\mathrm{i}\mathrm{d}$ Central Authentication Service CAS CAS 9 CAS CAS CGI $ \backslash $\mathrm{i}\mathrm{d}$ 1 2!- $\mathrm{i}\mathrm{d}$ CGI $\#^{1}\#\#$ FORM decode ( $\mathrm{i}\mathrm{d}/$ ) $\text{ }-$ $\#\#\#$ D $\#\#\#$ $\#\#\#_{l}$ HTML ( ) CGI CAS $\#\#\#$ FORM decode (\leftarrow \urcorner -- D/ ) client 7 $\#\#\#$ $\#^{1}\#\#$ HTML ( ) $\mathrm{c}\mathrm{a}\mathrm{s}$ CGI CAS Yale perl Java PHP $\mathrm{p}\mathrm{l}/\mathrm{s}\mathrm{q}\mathrm{l}$ Python Ruby CGI \check 23 CAS Yale CAS $\star$ Form GET $\mathrm{u}\mathrm{r}\mathrm{t}$ Form GET URL Fonn GET POST $9_{\iota}\mathrm{C}\mathrm{A}\mathrm{S}\mathrm{i}\mathrm{f}\dot{\mathrm{y}}$ $\exists$ CAS CAS / CASffied Applicatiorl

10 $\mathrm{h}^{\neg}\mathrm{b}^{\mathrm{y}}\mathrm{c}$ Ji\mathrm{p}$ 23 $\star$ $\star$ CAS POST POST Folm Form 1 Form CAS CAS Java Script $\mathrm{c}\mathrm{g}\mathrm{i}$ CAS 2 TGC CAS Java Script 9 Form 2 Form CAS JSP GET CAS Service Parameter JSP CAS POST 1 POST Form Form Form HTML Form EUC-JP Form EUC-JP CAS Java CAS UTF-8 -JP URL Form 10 CAS CAS Login $\text{ }\grave{}$ Validation CAS ST 11 $*$ $\overline{1}\overline{()\mathrm{t}- \mathrm{i}\mathrm{i}}\overline{6j}_{1}7^{-} \overline{f}\overline{1jjr^{-\backslash }\sqrt}-\sim-$ $\grave a UTF-8\mbox{\boldmath $\tau$} EUC-JP $\mathrm{p}\mathrm{l}/\mathrm{s}\mathrm{q}\mathrm{l}$ Shift-JIS Oracie backend $\mathrm{u}^{r}\mathrm{i}\mathrm{f}^{\backslash }- 8$ 11

11 $\mathrm{c}\mathrm{a}\mathrm{s}^{s\underline{1}}$ $\llcorner^{\neg}\mathrm{a}\mathrm{s}^{2}$ 24 2 CAS $J\backslash$ 2 CAS Authentication (Authori zation) $ \{^{-}\overline{\mathrm{j}}$ Validation 3Central $\mathrm{a}\mathrm{u}\mathrm{t}\mathrm{h}\epsilon \mathrm{n}\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{a}\mathrm{t}\mathrm{i}\mathrm{o}\mathrm{n}$ and Authorization Service&lf CAS (Authorization ) $1\mathrm{I}\mathrm{J}$ CAS I CAS CAS Service $\backslash \gamma Based Authorization CAS ( \mathrm{a}1\mathrm{i}\mathrm{d}^{r}\mathrm{a}$tion) Service Atlthorization CAS $\text{ }$ Cross Site Scripting Service Based Authorization CAS 31 $\mathrm{c}^{\urcorner}\mathrm{a}\mathrm{s}^{2}$ Authorization service Service Based Authorization service Authorization Validatioll Validation service 1DAP (Validation) URL

12 $\ovalbox{\tt\small REJECT}^{-}\overline{\mathrm{c}\mathrm{d}\mathrm{n}:-\mathrm{c}\mathrm{a}\mathrm{s}}\mathrm{c}\mathrm{n}=\mathrm{u}\mathrm{o}\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{t}\mathrm{t}\mathrm{r}\mathrm{b}\mathrm{a}\mathrm{s}-\overline{\mathrm{a}\mathrm{u}\mathrm{t}\mathrm{h}\frac{\mathrm{P}}{\mathrm{i}}\mathrm{t}\mathrm{s}\mathrm{e}r\mathrm{v}\mathrm{i}\mathrm{c}}\underline{\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}}\underline{11o\mathrm{W}}$ $\cdot\langle$ $\mathrm{d}\mathrm{n}$ NailAddress 25 CAS Access Conrrol List (CAS-AC\llcorner ) CAS-ACL CAS-ACL LDAP Access Control List CAS-ACL CAS-ACL ; yurep t ;aedehnls $\cdot \mathrm{c}\cdot \mathrm{c}\mathrm{p}\mathrm{s}//\mathrm{a}\mathrm{p}\mathrm{p}\backslash _{\mathrm{i}_{\mathrm{e}0=\underline{\mathrm{n}\mathrm{u})}}^{\mathrm{f}\mathrm{o}\mathrm{o}/}}=+\mathrm{o}\mathrm{u}=\underline{\mathrm{p}\mathrm{e}\mathrm{o}\mathrm{p}}\prime \mathrm{o}\mathrm{b}\overline{\mathrm{a}\mathrm{s}\mathrm{i}\mathrm{c}\mathrm{u}=\mathrm{c}_{}\mathrm{a}\mathrm{s}}\overline{0=}\overline{\mathrm{n}\mathrm{u}}\mathrm{u}\mathrm{i}\mathrm{d}$ $\mathrm{m}\mathrm{a}\mathrm{i}1\mathrm{a}\mathrm{d}\mathrm{d}\mathrm{r}\mathrm{s}\mathrm{s}\mathrm{u}\mathrm{s}\mathrm{e}\mathrm{r}\mathrm{n}\mathrm{a}\mathrm{m}\mathrm{e}$ $\mathrm{d}\mathrm{n}\star----\lrcorner$ CAS-ACL URL cas-service URld $*$ $\mathrm{f}\mathrm{o}\mathrm{o}/$ $//\mathrm{a}\mathrm{p}\mathrm{p}\backslash$ https: URL URI- cas-service \sim $\mathrm{c}\mathrm{a}\epsilon$ LDAP $\mathrm{d}\mathrm{n}=+$ $\mathrm{o}\mathrm{u}=\mathrm{p}\mathrm{e}\mathrm{o}\mathrm{p}\mathrm{l}\mathrm{e}$ $0=\mathrm{n}\mathrm{u}$ 1 Authorization cas-attributes $\mathrm{d}\mathrm{n}$ $\mathrm{u}\mathrm{i}\mathrm{d}$ LDAP username -allow URL $\mathrm{c}1\mathrm{a}\mathrm{s}\mathrm{s}^{\backslash } (" \mathrm{c}\mathrm{a}\mathrm{s}- \mathrm{a}\mathrm{c}\mathrm{c}")$ Control Validation service cas-service CAS-ACL (cas-allow ) cas-allribu es ( $\acute{\{}\urcorner^{-}-$ CAS-ACL 33 ) CAS-ACL $\backslash$ CAS Access 312 Access Control List LDAP CAS-ACL cas-allow $\mathrm{i}\mathrm{p}$ $\text{ }$ $\prime \mathrm{j}$ 12(A]0\supset -- A \check A\iota O)

13 $\text{ }$ $\text{ }$ $\text{ }$ I $\mathrm{o}\mathrm{u}=\mathrm{s}\mathrm{t}:\mathrm{a}\mathrm{f}\mathrm{i}^{-}$ & $\mathrm{o}\mathrm{u}=\mathrm{p}\mathrm{e}\mathrm{o}\mathrm{p}\mathrm{l}\mathrm{e}$ $\mathrm{o}\mathrm{u}=\mathrm{n}\mathrm{u}$ 28 cas-attributes LDAP cas-allow: datiet ) (date $<= \dot{)}\grave{)}$ $\mathrm{i}\mathrm{m}\mathrm{e}>=2005$ $\mathrm{i}^{-}2005$ $\mathrm{d}\mathrm{n}=+$ cas-allow (&(&(dn= $+$ ) $\mathrm{o}\mathrm{u}=\mathrm{s}\:\mathrm{a}\mathrm{f}\mathrm{f}$ $\mathrm{o}\mathrm{u}=\mathrm{p}\mathrm{e}\mathrm{o}\mathrm{p}\mathrm{l}\mathrm{e}$ $\mathrm{o}\mathrm{u}--\mathrm{n}\mathrm{u}$ {&(datet: $\mathrm{i}\mathrm{m}\mathrm{e}>= $ $)\rangle$ ) (date$<=2005$ ) (& $00/16$ }( $\mathrm{p}=133\acute{\circ}$ $ $ $\mathrm{c}_{11}^{1}\mathfrak{n}\mathrm{e}>03001$ (time ) $<=0500\rangle)\backslash$ CAS-ACL CAS-ACL :

14 $\mathrm{d}\mathrm{n}$ : $\mathrm{d}\mathrm{n}$ : $\mathrm{d}\mathrm{n}$ : $\mathrm{o}\mathrm{u}--\mathrm{c}\mathrm{a}\mathrm{s}$ \mathrm{y}\mathrm{p}\mathrm{e}$ : ment $\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{u}\mathrm{c}\mathrm{h}-\mathrm{t}\mathrm{i}\mathrm{y}\mathrm{p}\mathrm{e}:\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}-$ $\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{u}\mathrm{c}\mathrm{h}-\mathrm{t}\mathrm{y}\mathrm{p}\mathrm{e}$ : $\mathrm{d}\mathrm{n}$ : ilter (access $\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{u}\mathrm{c}\mathrm{h}-\mathrm{c}\mathrm{y}\mathrm{p}\mathrm{e}$ : a datetime ime $\mathrm{o}\mathrm{u}--\mathrm{n}\mathrm{u}\rangle$ $\nearrow$ $\backslash \backslash \backslash$ 27 $\mathrm{c}\mathrm{n}=\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{t}\mathrm{i}\mathrm{m}\mathrm{e}$ $\mathrm{h}_{\sim}-\succ cas-aut; cas-allow: $\mathrm{c}\mathrm{n}=\mathrm{w}\mathrm{i}\mathrm{t}\mathrm{h}\mathrm{o}\mathrm{u}\mathrm{c}$ cas $\sim$ $($ allow: accessfilter en ance $\mathrm{c}$ $0=\mathrm{N}\mathrm{U}$ $>= _{\wedge}^{\mathrm{C} }00$ ) $\acute{\mathrm{t}}\mathrm{d}\mathrm{a}\mathrm{t}\mathrm{e}<= $ ) ) $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ $\mathrm{f}1^{l}1\overline{\mathrm{t}}$er $ (\mathrm{t}:\mathrm{i}\mathrm{m}\mathrm{e}>\mathrm{c}3\overline{0}0\rangle(\mathrm{t}\mathrm{i}\mathrm{m}\mathrm{e}<=0500) )$ $\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{i}\mathrm{i}1\mathrm{t}\mathrm{e}\mathrm{r}$ - cas-auth-type: $0=\mathrm{N}\mathrm{U}$ $\mathrm{c}\mathrm{n}=\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{t}\mathrm{i}\mathrm{m}\mathrm{e}_{-}0$ cas-allow: ( $\mathrm{g}$ ( $\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{f}$ $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ access $\mathrm{f}$ilcer $=\mathrm{c}\mathrm{n}=\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{c}\mathrm{i}\mathrm{m}\mathrm{e}$ $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ $\overline{\mathrm{f}}$ilcer $0=\mathrm{N}\mathrm{U}^{1}$) $0=\mathrm{N}\mathrm{U}\rangle$ $=\mathrm{c}\mathrm{n}_{-}^{-}\overline{\mathrm{w}}\mathrm{i}\mathrm{t}\mathrm{h}\mathrm{o}\mathrm{u}\mathrm{t}\mathrm{m}-\mathrm{e}\mathrm{n}\mathrm{t}\mathrm{e}\mathrm{n}\mathrm{a}\mathrm{n}\mathrm{c}\mathrm{e}_{-}\mathrm{t}\mathrm{i}\mathrm{m}\mathrm{e}$ $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ ) o NU $\mathrm{c}\mathrm{n}=\mathrm{s}\mathrm{c}\mathrm{a}\mathrm{f}\mathrm{f}_{-}\mathrm{i}\mathrm{n}_{-}\mathrm{u}\mathrm{n}\mathrm{i}\mathrm{v}$ $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ $\mathrm{a}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}_{-}\mathrm{f}$ilter $0=\mathrm{N}\mathrm{U}$ cas-allow: (&(dn= $+$ $\mathrm{o}\mathrm{u}=\mathrm{s}\mathrm{t}\mathrm{a}\mathrm{f}\mathrm{f}$ $\mathrm{o}\mathrm{u}=\mathrm{p}\mathrm{e}\mathrm{o}\mathrm{p}\mathrm{l}\mathrm{e}$ (I $\mathrm{p}=133600/16\rangle$ ) 32 Service Ticket One-Time Ticket $-\wedge$ Login $-\cdot--\sim$ 3 CAS $\text{ }$ Validation CAS-ACC URL (ST) nextticket CAS-ACC URL 1 CAS-ACC nextticket CAS-ACL cas-attributes 1314 $\mathrm{s}\mathrm{t}/\mathrm{t}\mathrm{g}\mathrm{c}$ \mathrm{t}\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{k}\mathrm{e}\mathrm{t}$ $\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{t}\mathrm{t}\mathrm{r}\mathrm{i}\mathrm{b}\mathrm{u}\mathrm{t}\mathrm{e}\mathrm{s}$ none $\epsilon $\mathrm{f}_{\llcorner}^{-}$ $\mathrm{n}\mathrm{c}^{4}\mathrm{x}\mathrm{t}\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{k}\mathrm{e}\iota$ 13 nextticket 14 (33 ) nexlticket

15 ributes $<\mathrm{c}\mathrm{a}\mathrm{s}:\mathrm{a}\mathrm{u}\mathrm{t};\mathrm{h}\mathrm{e}\mathrm{n}\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{a}\mathrm{t}\mathrm{i}\mathrm{o}\mathrm{n}\mathrm{s}\mathrm{u}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}>$ $<\mathrm{c}\mathrm{a}\mathrm{s}:\mathrm{t}$ $<\mathrm{c}\mathrm{a}\mathrm{s}$ :user :user $<\mathrm{c}\mathrm{a}\mathrm{s}:\mathrm{a}\mathrm{t}\mathrm{t}r\mathrm{i}\mathrm{b}\mathrm{u}\mathrm{t}\mathrm{e}\mathrm{s}>$ $</\mathrm{c}\mathrm{a}\mathrm{s}$ $<\mathrm{c}\mathrm{a}\mathrm{s}$ :attiribute-l $<\mathrm{c}\mathrm{a}\mathrm{s}$ Re} \mathrm{s}\mathrm{p}\mathrm{o}\mathrm{n}\mathrm{s}\mathrm{e}>$ \mathrm{u}\mathrm{s}\mathrm{e}\mathrm{r}\mathrm{i}\mathrm{d}=\mathrm{r}\mathrm{e}\mathrm{s}\mathrm{u}\mathrm{l}\mathrm{e}$ ribut 28 -ZXZXZXZX $\mathrm{i}\mathrm{m}\mathrm{e}$ remaining-t : 10 CAS-dn: $\mathrm{d}\mathrm{n}_{\overline{-}}\ldots$ Figure 8: $\mathrm{t}g\mathrm{c}$ User Attributes 15 [Hash Tablei CAS-ACL ( ) TGC Validation XML $<\mathrm{c}\mathrm{a}\mathrm{s}:\mathrm{a}\mathrm{t}\mathrm{t}^{1}1$ $>$ CAS-ACL $<\mathrm{c}\mathrm{a}\mathrm{s}:$ $={}^{t}\mathrm{h}\mathrm{t}\mathrm{t}\mathrm{p}://\mathrm{w}\mathrm{w}\mathrm{w}$ serviceresponse xmlns:cas yale icket $>\mathrm{s}\mathrm{t}-\mathrm{x}\mathrm{x}\mathrm{x}\mathrm{x}\mathrm{x}</$cas: $>\mathrm{n}\mathrm{e}\mathrm{t}\mathrm{i}\mathrm{d}</\mathrm{c}\mathrm{a}\mathrm{s}$ $\mathrm{t}\mathrm{i}\mathrm{c}\mathrm{k}\mathrm{e}\mathrm{c}>$ $>$ $>\mathrm{a}\mathrm{t}:\mathrm{t}:$ $>\mathrm{a}\mathrm{t}:\:$ :allribute-2 $\mathrm{e}-1-\mathrm{v}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{e}</\mathrm{c}\mathrm{a}\mathrm{s}$:at $\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{t}\mathrm{p}/\mathrm{c}\mathrm{a}\mathrm{s} >$ $\mathrm{c}\mathrm{r}\mathrm{i}\mathrm{b}\mathrm{u}\mathrm{c}\mathrm{e}-1>$ at:tribute-2-va1ue-2</cas :attribute-2 $>$ $</$ cas : Attributes $>$ ribute-2-va1ue-1 $</$cas : $\mathrm{s}\mathrm{e}\mathrm{r}\mathrm{v}\mathrm{i}\mathrm{c}\mathrm{e}{\rm : $\mathrm{a}\mathrm{u}\mathrm{t}\mathrm{h}\mathrm{e}\mathrm{n}\mathrm{t}\mathrm{l}\mathrm{c}\mathrm{a}\mathrm{t}\mathrm{i} \mathrm{o}\mathrm{n}\mathrm{s}\mathrm{u}\mathrm{c}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{s}>$ Figure 9: $\mathrm{c}\mathrm{a}\mathrm{s}^{\underline{9}}$ XML CAS( $\mathrm{c}\mathrm{a}\mathrm{s}^{r}a$) Attributes $ $ $-H $\mathrm{t}\mathrm{a}\mathrm{b}\mathrm{l}\mathrm{e}$ XML ash UserID $ :\mathrm{r}\mathrm{e}\mathrm{s}\mathrm{u}\mathrm{l}\mathrm{t}$ netid 35

16 $\mathrm{d}\mathrm{n}$ 29 fullname resu attrlbutes fullname nextticket CAS 331 (1) 211 CAS 211 $\mathrm{a}\mathrm{c}\dot{3}\mathrm{p}/\mathrm{a}\mathrm{p}\mathrm{p}/$) $//\mathrm{f}\mathrm{o}\mathrm{o}$ 1 ( hllps: nagoya-u (CAS ) -] Login 211 (1) (3) CAS (Login) TGC $\mathrm{s}^{\neg}\mathrm{t}$ service $\mathrm{e}$ CAS-ACL (Fi ] 10 ) CAS-ACL (Authorization) CAS-ACC ICAS-ACL ) (4) (CAS ) Licket service URL CAS-ACL CAS-ACC CAS-ACC CAS-ACL CAS-ACL nextticket ST -\sim CAS-ACC (Figure 11 ) 2 Service Based Authotization CAS2\dashv $\mathrm{c}^{\backslash }\mathrm{a}\mathrm{s}^{2}$ $16 - \#_{\backslash }-\mathbb{p}_{s\backslash }\overline{\prime}c]\mathrm{j}_{[perp]}^{r}$ $\mathrm{l}\overline{ }\mathrm{b}^{\mathrm{a}}\supset-$

17 $17\mathrm{F}\backslash \mathrm{i}\mathrm{g}\mathrm{u}\mathrm{r}\mathrm{e}9$ 30 CAS-ACC service ( URL :Man-in-Middle attack) Figure 10: (1) Figure 11: (2) Figure 12: (3) 332 $\mathrm{c}\mathrm{a}\mathrm{s}^{i}\underline{)}$ (2) nextticket URL - CAS-ACC URL 17 $\text{ }\backslash$ 213 Login (CAS ) Validation CAS 1 4 CAS-ACC URL nextticket CAS-ACC CAS-ACC (CAS ) Login (Figure 12 ) TGC ( ) - CAS nextticket $\backslash j\prime $\backslash$ \mathrm{d}\mathrm{l}\mathrm{i}\mathrm{d}\mathrm{a}\mathrm{t}\mathrm{i}\mathrm{o}\mathfrak{n}$ } XML :cas: ticket>

18 $18\mathrm{C}^{\backslash }\mathrm{a}\mathrm{s}$ \mathrm{o}\mathrm{s}\mathrm{s}$ Site $3\mathrm{t}$ 333 Cross Site Scripting $\mathrm{c}\iota\cdot Service Based Authorization Scripting (XSS) XSS Form HTML (HTML ) [ $\circ$ [ (Sanitalize) XSS 4 CAS XSS service 18 Service Based Authorization service ( ) CAS-ACC 34 Service Based Authorization CAS-ACL POST \ ) $\mathrm{c}\mathrm{a}\mathrm{s}^{\sim} $ - $\cdot$ TGC TGC CAS POST CAS CAS Java Script $\grave{\grave{\mathrm{a}}}$ casrbquestnetflod : GET POST GET Java Script 4 ENCODING : character encoding $\backslash \backslash \backslash$ $\mathrm{c}\mathrm{a}\mathrm{s}^{\ }\backslash$ UTF-8 Java Script JSP character encoding CAS fj Form (GET POST) charaater encodin CAS Form POST lava Script POST service Forrn (GET )

19 $\mathrm{d}\mathrm{n}$ : $\mathrm{c}\mathrm{a}\mathrm{s}-\mathrm{a}\mathrm{u}\mathrm{t}\mathrm{h}-\mathrm{t}\mathrm{y}\mathrm{p}\mathrm{e}$ : $\mathrm{d}\mathrm{n}$ : $19\grave{\mathrm{A}} \mathrm{l}\mathrm{y}\mathrm{n}\mathrm{t}\mathrm{j}$ $\mathrm{u}\mathrm{i}\mathrm{d}=\mathrm{k}\mathrm{a}\mathrm{j}$ $\dot{\mathrm{t}}[2]$ Access Control List CAS-ACL t (Admin) Admin CAS-ACL Admin CAS-ACL cas-au hc t 8 $\mathrm{e}$ trusted CAS-ACL Lrus Led CAS-ACL (1): $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ cas-allow: $0=\mathrm{N}\mathrm{U}$ $ $ $\mathrm{u}\mathrm{i}\mathrm{d}=\mathrm{n}\mathrm{a}\mathrm{l}$ to trus $\mathrm{c}\mathrm{e}\mathrm{d}$ CAS-ACL LDAP DIT CAS-ACL subtree root node $\mathrm{u}\mathrm{i}\mathrm{d}_{-}$ -naito $ \wedge$ CAS-ACL Admin CAS-ACL \mathrm{a}\mathrm{c}\mathrm{j}_{-d}$ $\mathrm{c}\mathrm{a}\mathrm{s}- trusted (2): $\mathrm{o}\mathrm{u}_{-}^{-}\mathrm{u}\mathrm{p}\mathrm{o}\mathrm{r}\mathrm{t}\mathrm{a}1$ $0=\mathrm{N}\mathrm{U}$ $\mathrm{o}\mathrm{u}=\mathrm{c}\mathrm{a}\mathrm{s}$ $\rangle$ ita cas-allow: cas-auth-cype: trusted $=\mathrm{u}\mathrm{p}\mathrm{o}\mathrm{r}\mathrm{t}\mathrm{a}\mathrm{l}$ $0=\mathrm{N}\mathrm{U}$ CAS-ACL ou $\mathrm{o}\mathrm{u}_{-}^{-}\mathrm{c}\mathrm{a}\mathrm{s}$ subtree root node $\mathrm{u}\mathrm{i}\mathrm{d}=\mathrm{k}\mathrm{a}\mathrm{j}\mathrm{i}\mathrm{t}\mathrm{a}$ subtree Admin CAS-ACL \mathrm{n}\mathrm{u}$ ) My$\prime $\mathrm{m}\mathrm{y}_{1}^{\backslash }\mathrm{t}\mathrm{u}$ 19 2

20 $21\tau 14\mathrm{y}\mathrm{N}\mathrm{U}$ $\mathrm{c}\mathrm{a}\mathrm{s}^{\underline{?}}$ $\mathrm{m}\} \mathrm{n}\mathrm{u}$ $ \frac{}{\text{ _{};\mathrm{l}}arrow J^{\backslash }+\mathrm{k}-j\backslash ^{\backslash }\mathrm{s}\backslash \mathrm{u}\mathrm{n}\mathrm{f}\mathrm{i}\mathrm{r}\mathrm{e}\backslash ^{7}210\mathrm{V}120\text{ _{}\sim^{\mathrm{j}}} }\frac{\overline{7}^{--\text{ }\swarrow\backslash ^{\backslash }-\text{ }\theta^{-}-\nearrow\grave{\grave{\mathrm{a}}}\mathrm{s}\mathrm{u}\mathrm{l}1\mathrm{f}^{\neg}\mathrm{i}\mathrm{r}\mathrm{e}\mathrm{v}21\mathrm{f}\mathrm{j}1}\backslash \backslash \angle\backslash \square }{\Xi\backslash \backslash \mathrm{f}\#_{\mathrm{j}}^{\mathrm{j}}1_{\mathrm{b}}^{\backslash \hat{\approx}}\#\mathrm{k}^{?}\grave{\backslash }\text{ ^{}\overline{-\gamma}}[perp]_{\backslash }}\cdot$ $\underline{\mathrm{p}}\grave{\grave{\text{ }}}-\text{ }\theta^{-}-f\backslash \backslash \backslash$ Sun?-[? Standby $4_{\square }^{\mathrm{a}}$ $\underline{1\angle\fbox(\backslash +\mathrm{h}\mathrm{o}\mathrm{t}\mathrm{s}\mathrm{t}\mathrm{a}\mathrm{l}\mathrm{u}\mathrm{d}\mathrm{b}\mathrm{y}}$ 33 $\mathrm{h}\prime \mathrm{l}\mathrm{y}\mathrm{n}\mathrm{u}$ (2005 ) $\cdot$ $\underline{7}0$ $\text{ }$ 2005 MyNU ( ) MyNU $\mathrm{c}\mathrm{a}\mathrm{s}^{\sim}$ 412 MyNU LDAP Sun Fire V48(J1 Sun Fire V120 $\{\mathrm{i}^{-\overline{1}\mathrm{o}!}$ $\mathrm{v}1$ LDAP Sun Fire Sun Fire $\mathrm{v}210$ $(\mathrm{h}\mathrm{o}^{:}$ { $\mathrm{i}-\overline{1}\mathrm{o}\mathrm{t}$ $1rightarrow$) $\square$ (Hot Standby 1 $\mathit{1}\backslash \square$) $1_{\square }J\sim)$ $\overline{\text{ ^{}\underline{\gamma}\mathrm{a}}\mathrm{n}}$ $\angle-\mathrm{u}^{1}-$ Sun Fire V240 1 Tabie 1: (Figure 13) Nortel Networks Alteon $ff\}_{\mathrm{d}}\triangleleft$ Alteon& $\mathrm{s}\mathrm{s}\mathrm{l}$ \sigma SSL $\mathrm{b}^{\mathrm{a}}$ SSL Alteon $\mathrm{m}\mathrm{v}\mathrm{n}\mathrm{u}$ Alteon $\Delta$ SSL

21 $-\overline{\mathrm{a}\mathrm{t}\mathrm{a}8\mathrm{a}\mathrm{s}\mathrm{e}}$ $\mathrm{e}$ $\overline{\mathrm{d}\mathrm{i}\mathrm{s}\mathrm{l}[\mathrm{a}rr\mathrm{a}\mathrm{y}}$ 34 $-$ $\ldots\ldots\ldots-$ OataBas S-e-rver Figure 13: MyNU Figure 14: MyNU Login Window MuNU A uportal $10_{\epsilon}\sigma$ Oracle $\mathrm{u}\mathrm{p}\mathrm{o}\mathrm{r}\iota \mathrm{a}\mathrm{l}$ uportal Java Java $\mathrm{c}\mathrm{a}\mathrm{s}^{\mathrm{r}}\delta$ MyNU $\mathrm{p}\mathrm{l}/\mathrm{s}\mathrm{q}\mathrm{l}$ Oracle(9i) $\cdot \mathrm{p}\mathrm{l}/\mathrm{s}\mathrm{q}\mathrm{l}\mathrm{c}\mathrm{a}\mathrm{s}^{2}$ MyNU $()()$ [ $)$ t 9 (464 )

22 (203 ) 2 $\mathrm{i}\mathrm{d}$ 22 ( $34$ ) $->\mathrm{c}\mathrm{a}\mathrm{s}^{2}$ $arrow \mathrm{m}\mathrm{y}\mathrm{n}\mathrm{u}$ MyNU ( ) $-\text{ }$ 2 3 $-\cdot$ \rightarrow 4 (1 25 ) $arrow$ $/\backslash$ ( ) $\wedge\cdot\sim$ $-\mathrm{c}\mathrm{a}\mathrm{s}^{2}$ $arrow \mathrm{m}\mathrm{y}\mathrm{n}\mathrm{u}$ 1 MyNU ( ) $-\text{ }$ 2 3 ( ) ( ) 4 5 $arrow$ $arrow$ ( ) 1 MyNU $arrow \mathrm{m}\mathrm{y}\mathrm{n}\mathrm{u}$ ( ) 2 [ 3 $f^{--\mathrm{j}}$ $rightarrow$ 4 $arrow$ 22 $1\mathrm{D}\mathrm{J}$ ID (Figure 14) MyNU ( LDAP ) $\sqrt[\backslash ]{}1\mathrm{D}$ t LDAP

23 $\ovalbox{\tt\small REJECT}^{-}\backslash ffl^{-}\hslash_{\mathrm{a}^{[perp]}}^{\acute{/}\dot{\backslash }}$ $\prime \mathit{1}\mathrm{x}\mathrm{f}\#_{1\dot{\mathrm{a}}-};\neq\lambda\backslash 7]$ \mathcal{f}\mathrm{j})$ $\mathrm{a}\vec{\equiv_{\mathrm{j}}}+\mathfrak{q}\iota(\overline{\iota}^{-}\square ^{-\tilde{\mathrm{j}}})$ 38 ( ) e-test suite (cf [3]) CPU 85% Table 2: CAS 3000 / $\mathrm{i}$ 1 10 \ A c $l\mathrm{y}_{-\mathrm{q}}^{\mathrm{t}}\mathrm{l}^{\check{j}}$ ( ) CAS 3000 / $\Re^{-\lrcorner}-- \mathrm{a}\in -$ $(\mathrm{u}\overline{\gamma}_{-}\overline{7}/t\backslash $\ovalbox{\tt\small REJECT}\{1_{i}^{\not\in} $ $\ovalbox{\tt\small REJECT}--ffl) \backslash$ Table 3: CAS 23 $9\mathrm{i}$ $\tilde{\tau}\delta$ Oracle $)$ SQL 15{

24 $24\mathrm{f}\mathrm{f}\mathrm{l}\mathrm{B}18*_{\backslash }\cdot h^{\iota}\text{ }20$ 27%) 37 $\mathrm{c}\mathrm{a}\mathrm{s}^{\iota}\sim\gamma$ (10 ) Lo 02 Validation $\mathrm{n}$ 005 $\nearrow\cdot-\wedge(\mathrm{j}^{\cdot}$ CAS $\overline{\overline{\overline{j} \text{ }\cdot \mathrm{b}\text{ }\overline{\pi}a\supset \text{ }\mathrm{t}\supset\nearrow\backslash _{\backslash }\text{ }\backslash f^{\grave{\backslash }}}}$ 1919 (250%) 982 (128%) netbbcec 667 $87^{c/_{\mathit{0}})}$ ( ( ) nedion $3^{\iota}\mathrm{P}$ $\mathrm{j}\mathrm{p}$ neocn 622 (81%) 597 (7S%} 402 $(\overline{3}2\%)$ $]\mathrm{p} $ nestarcat $( ^{o}J\mathrm{o})$ ( ) $\mathrm{p}$ neso-net ) $19^{\eta}$ $(26\Psi \mathit{0})$ $\mathrm{j}\mathrm{p}$ neaitai 4199 (570%) $\mathrm{x}\mathrm{p}$ windows MSIE 1757 (239%) windows2000netscape 757 (103%) Windows 98 MSIE 201 ( 27%) windows 2000MSIE F $\not\cong-\psi $-\backslash \mathfrak{g}_{\sigma}\doteqdot$? r\backslash$ l\lambda \sim 1\breve $\psi^{\backslash 25 }\cdot$ 1

25 $\underline{0}6$ $\mathrm{r}$ 38 Table 4: 30% 5 CAS Queens University $\mathrm{f}_{\mathit{2}}$ Central Authentication and Authorization Service $\mathrm{v}\iota\mathrm{r}\mathrm{s}\mathrm{i}\mathrm{o}\mathrm{n}2$ CAS CAS Version 3 Spring Framework Spring Framework Central Authentication and Authorization Service CAS CAS CAS $\mathrm{t}\mathrm{g}\mathrm{c}/\mathrm{s}\mathrm{t}$ Java RM I } $\mathrm{t}\mathrm{g}\mathrm{c}/\mathrm{s}\mathrm{t}$ CAS CAS CAS - CAS 26 f-}3 CAS $ \wedge$ CAS $\mathrm{s}\mathrm{s}\mathrm{l}$

26 Cenrral CAS )a-sig -index \mathrm{i}\mathrm{n}\mathrm{t}\mathrm{e}\mathrm{r}\mathrm{n}\mathrm{e}\mathrm{t}2-\mathrm{m}\mathrm{a}\mathrm{c}\mathrm{e}$ 0\mathrm{t}l5$ 38 [1] Yale University ITS Technology & Planning http: $//\mathrm{t}\mathrm{p}$ $\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{t}\mathrm{i}\mathrm{k}\mathrm{i}/\mathrm{t}\mathrm{i}\mathrm{k}\mathrm{i}$ itsyale [2] hllps: $//\mathrm{m}\mathrm{y}\mathrm{n}\mathrm{u}\dot{3}\mathrm{p}/$ $\mathrm{p}\mathrm{h}\mathrm{p}$ [31 $\mathrm{e}$-test srute http $://\mathrm{w}\mathrm{w}\mathrm{w}$ $\mathrm{f}\mathrm{m}\mathrm{w}$ fuj $\mathrm{i}$ $\mathrm{c}\mathrm{o}\mathrm{m}/\mathrm{s}\mathrm{e}\mathrm{r}\mathrm{v}\mathrm{i}\mathrm{c}\mathrm{e}\mathrm{s}/\mathrm{e}\mathrm{c}\mathrm{e}\mathrm{s}\mathrm{t}\mathrm{s}\mathrm{u}\mathrm{i}\mathrm{t}\mathrm{e}/$ tsu [4] CAS Generic Hindler http: $//\mathrm{e}\mathrm{s}\mathrm{u}\mathrm{p}$-casgeneric sourceforge $\mathrm{n}\mathrm{e}\mathrm{t}/$ [5] JA-SIG hbtp: $//\mathrm{w}\bm{\mathrm{w}}\mathrm{w}$ $\mathrm{o}\mathrm{r}\mathrm{g}/$ [ $6\rfloor$ Authentication Service http: $//\mathrm{j}$ asigchprinceton $\mathrm{e}\mathrm{d}\mathrm{u}:9000/\mathrm{d}\mathrm{i}\mathrm{s}\mathrm{p}\mathrm{l}\mathrm{a}\mathrm{y}/\mathrm{c}\mathrm{a}\mathrm{s}r$ [7] Internct2 Working Group Shibboleth Architecture http: $//\mathrm{d}\mathrm{o}\mathrm{c}\mathrm{s}$ $\mathrm{e}\mathrm{t}\mathrm{h}-$ - shibbol archi interoet2 $\mathrm{e}\mathrm{d}\mathrm{u}/\mathrm{d}\mathrm{o}\mathrm{c}\mathrm{l}\mathrm{i}\mathrm{b}/\mathrm{d}\mathrm{r}\mathrm{a}\mathrm{f}\mathrm{c}arrow tecture -05 htnl [ $8\rfloor$ Genefic Handler http: $//\mathrm{e}\mathrm{s}\mathrm{u}\mathrm{p}$-casgenericsourceforge $\mathrm{n}\mathrm{e}\mathrm{t}/$ [91 CAS $\gammaarrow $(2[l\mathrm{f}\mathrm{J}5)$ $\mathrm{p}\mathrm{p}$ Vol No [101 CAS 3 WebCT Conference $\mathrm{p}\mathrm{p}$ $ $ (2005)

main.dvi

main.dvi Central Authentication and Authorization Service Web Application (Hisashi NAITO) Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp (Shoji KAJITA) Information Technology Center,

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS Single Sign On (Hisashi NAITO) naito@math.nagoya-u.ac.jp Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp, Oct. 19, 2005 Tohoku Univ. p. 1/40 Plan of Talk CAS CAS 2 CAS Single

More information

Dec , IS p. 1/60

Dec , IS p. 1/60 Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization to@math.nagoya-u.ac.jp, Powered by A

CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization to@math.nagoya-u.ac.jp, Powered by A Central Authentication System naito@math.nagoya-u.ac.jp to@math.nagoya-u.ac.jp, Powered by Adobe Reader & ipod Photo March 10, 2005 RIMS p. 1/55 CAS Yale Open Source software Authentication Authorization

More information

$\mathrm{v}$ ( )* $*1$ $\ovalbox{\tt\small REJECT}*2$ \searrow $\mathrm{b}$ $*3$ $*4$ ( ) [1] $*5$ $\mathrm{a}\mathrm{c}

$\mathrm{v}$ ( )* $*1$ $\ovalbox{\tt\small REJECT}*2$ \searrow $\mathrm{b}$ $*3$ $*4$ ( ) [1] $*5$ $\mathrm{a}\mathrm{c} Title 狩野本 綴術算経 について ( 数学史の研究 ) Author(s) 小川 束 Citation 数理解析研究所講究録 (2004) 1392: 60-68 Issue Date 2004-09 URL http://hdlhandlenet/2433/25859 Right Type Departmental Bulletin Paper Textversion publisher Kyoto

More information

42 1 ( ) 7 ( ) $\mathrm{s}17$ $-\supset$ 2 $(1610?\sim 1624)$ 8 (1622) (3 ), 4 (1627?) 5 (1628) ( ) 6 (1629) ( ) 8 (1631) (2 ) $\text{ }$ ( ) $\text{

42 1 ( ) 7 ( ) $\mathrm{s}17$ $-\supset$ 2 $(1610?\sim 1624)$ 8 (1622) (3 ), 4 (1627?) 5 (1628) ( ) 6 (1629) ( ) 8 (1631) (2 ) $\text{ }$ ( ) $\text{ 26 [\copyright 0 $\perp$ $\perp$ 1064 1998 41-62 41 REJECT}$ $=\underline{\not\equiv!}\xi*$ $\iota_{arrow}^{-}\approx 1,$ $\ovalbox{\tt\small ffl $\mathrm{y}

More information

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32 CAS Single Sign On naito@math.nagoya-u.ac.jp naito@math.nagoya-u.ac.jp, Aug. 19, 2005 NII p. 1/32 Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS naito@math.nagoya-u.ac.jp, Aug. 19, 2005 NII p.

More information

Title Compactification theorems in dimens Topology and Related Problems) Author(s) 木村, 孝 Citation 数理解析研究所講究録 (1996), 953: Issue Date URL

Title Compactification theorems in dimens Topology and Related Problems) Author(s) 木村, 孝 Citation 数理解析研究所講究録 (1996), 953: Issue Date URL Title Compactification theorems in dimens Topology and Related Problems Authors 木村 孝 Citation 数理解析研究所講究録 1996 953 73-92 Issue Date 1996-06 URL http//hdlhandlenet/2433/60394 Right Type Departmental Bulletin

More information

Title 改良型 S 字型風車についての数値シミュレーション ( 複雑流体の数理とシミュレーション ) Author(s) 桑名, 杏奈 ; 佐藤, 祐子 ; 河村, 哲也 Citation 数理解析研究所講究録 (2007), 1539: Issue Date URL

Title 改良型 S 字型風車についての数値シミュレーション ( 複雑流体の数理とシミュレーション ) Author(s) 桑名, 杏奈 ; 佐藤, 祐子 ; 河村, 哲也 Citation 数理解析研究所講究録 (2007), 1539: Issue Date URL Title 改良型 S 字型風車についての数値シミュレーション ( 複雑流体の数理とシミュレーション ) Author(s) 桑名, 杏奈 ; 佐藤, 祐子 ; 河村, 哲也 Citation 数理解析研究所講究録 (2007), 1539 43-50 Issue Date 2007-02 URL http//hdlhandlenet/2433/59070 Right Type Departmental

More information

40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45

40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45 ro 980 1997 44-55 44 $\mathrm{i}\mathrm{c}\mathrm{h}\mathrm{i}$ $-$ (Ko Ma $\iota_{\mathrm{s}\mathrm{u}\mathrm{n}}0$ ) $-$. $-$ $-$ $-$ $-$ $-$ $-$ 40 $\mathrm{e}\mathrm{p}\mathrm{r}$ 45 46 $-$. $\backslash

More information

106 (2 ( (1 - ( (1 (2 (1 ( (1(2 (3 ( - 10 (2 - (4 ( 30 (? (5 ( 48 (3 (6 (

106 (2 ( (1 - ( (1 (2 (1 ( (1(2 (3 ( - 10 (2 - (4 ( 30 (? (5 ( 48 (3 (6 ( 1195 2001 105-115 105 Kinki Wasan Seminar Tatsuo Shimano, Yasukuni Shimoura, Saburo Tamura, Fumitada Hayama A 2 (1574 ( 8 7 17 8 (1622 ( 1 $(1648\text{ }$ - 77 ( 1572? (1 ( ( (1 ( (1680 1746 (6 $-$.. $\square

More information

14 6. $P179$ 1984 r ( 2 $arrow$ $arrow$ F 7. $P181$ 2011 f ( 1 418[? [ 8. $P243$ ( $\cdot P260$ 2824 F ( 1 151? 10. $P292

14 6. $P179$ 1984 r ( 2 $arrow$ $arrow$ F 7. $P181$ 2011 f ( 1 418[? [ 8. $P243$ ( $\cdot P260$ 2824 F ( 1 151? 10. $P292 1130 2000 13-28 13 USJC (Yasukuni Shimoura I. [ ]. ( 56 1. 78 $0753$ [ ( 1 352[ 2. 78 $0754$ [ ( 1 348 3. 88 $0880$ F ( 3 422 4. 93 $0942$ 1 ( ( 1 5. $P121$ 1281 F ( 1 278 [ 14 6. $P179$ 1984 r ( 2 $arrow$

More information

110 $\ovalbox{\tt\small REJECT}^{\mathrm{i}}1W^{\mathrm{p}}\mathrm{n}$ 2 DDS 2 $(\mathrm{i}\mathrm{y}\mu \mathrm{i})$ $(\mathrm{m}\mathrm{i})$ 2

110 $\ovalbox{\tt\small REJECT}^{\mathrm{i}}1W^{\mathrm{p}}\mathrm{n}$ 2 DDS 2 $(\mathrm{i}\mathrm{y}\mu \mathrm{i})$ $(\mathrm{m}\mathrm{i})$ 2 1539 2007 109-119 109 DDS (Drug Deltvery System) (Osamu Sano) $\mathrm{r}^{\mathrm{a}_{w^{1}}}$ $\mathrm{i}\mathrm{h}$ 1* ] $\dot{n}$ $\mathrm{a}g\mathrm{i}$ Td (Yisaku Nag$) JST CREST 1 ( ) DDS ($\mathrm{m}_{\mathrm{u}\mathrm{g}}\propto

More information

Title DEA ゲームの凸性 ( 数理最適化から見た 凸性の深み, 非凸性の魅惑 ) Author(s) 中林, 健 ; 刀根, 薫 Citation 数理解析研究所講究録 (2004), 1349: Issue Date URL

Title DEA ゲームの凸性 ( 数理最適化から見た 凸性の深み, 非凸性の魅惑 ) Author(s) 中林, 健 ; 刀根, 薫 Citation 数理解析研究所講究録 (2004), 1349: Issue Date URL Title DEA ゲームの凸性 ( 数理最適化から見た 凸性の深み 非凸性の魅惑 ) Author(s) 中林 健 ; 刀根 薫 Citation 数理解析研究所講究録 (2004) 1349: 204-220 Issue Date 2004-01 URL http://hdl.handle.net/2433/24871 Right Type Departmental Bulletin Paper

More information

1: 3 CAS[3] uportal[4] (Web ) 3.1 CAS CAS[3] Yale JA-SIG [5] CAS 1. 2(1) CAS Web (2)CAS ID LDAP 2. 2(3) CAS Web CAS Ticket (4)Web Ticket 3. Ticket Web

1: 3 CAS[3] uportal[4] (Web ) 3.1 CAS CAS[3] Yale JA-SIG [5] CAS 1. 2(1) CAS Web (2)CAS ID LDAP 2. 2(3) CAS Web CAS Ticket (4)Web Ticket 3. Ticket Web ,, 2007 8 2006 CAS uportal Web 2006 10 Web keyword:, CAS, uportal, 1 SOSEKI 1300 2006 PC LAN IT (LMS: Learning Management System) WebCT CALL (Computer Assisted Language Learning) LMS IT [1] 2004 SOSEKI

More information

(Kazuo Iida) (Youichi Murakami) 1,.,. ( ).,,,.,.,.. ( ) ( ),,.. (Taylor $)$ [1].,.., $\mathrm{a}1[2]$ Fermigier et $56\mathrm{m}

(Kazuo Iida) (Youichi Murakami) 1,.,. ( ).,,,.,.,.. ( ) ( ),,.. (Taylor $)$ [1].,.., $\mathrm{a}1[2]$ Fermigier et $56\mathrm{m} 1209 2001 223-232 223 (Kazuo Iida) (Youichi Murakami) 1 ( ) ( ) ( ) (Taylor $)$ [1] $\mathrm{a}1[2]$ Fermigier et $56\mathrm{m}\mathrm{m}$ $02\mathrm{m}\mathrm{m}$ Whitehead and Luther[3] $\mathrm{a}1[2]$

More information

$\hat{\grave{\grave{\lambda}}}$ $\grave{\neg}\backslash \backslash ^{}4$ $\approx \mathrm{t}\triangleleft\wedge$ $10^{4}$ $10^{\backslash }$ $4^{\math

$\hat{\grave{\grave{\lambda}}}$ $\grave{\neg}\backslash \backslash ^{}4$ $\approx \mathrm{t}\triangleleft\wedge$ $10^{4}$ $10^{\backslash }$ $4^{\math $\mathrm{r}\mathrm{m}\mathrm{s}$ 1226 2001 76-85 76 1 (Mamoru Tanahashi) (Shiki Iwase) (Toru Ymagawa) (Toshio Miyauchi) Department of Mechanical and Aerospaoe Engineering Tokyo Institute of Technology

More information

Archimedean Spiral 1, ( ) Archimedean Spiral Archimedean Spiral ( $\mathrm{b}.\mathrm{c}$ ) 1 P $P$ 1) Spiral S

Archimedean Spiral 1, ( ) Archimedean Spiral Archimedean Spiral ( $\mathrm{b}.\mathrm{c}$ ) 1 P $P$ 1) Spiral S Title 初期和算にみる Archimedean Spiral について ( 数学究 ) Author(s) 小林, 龍彦 Citation 数理解析研究所講究録 (2000), 1130: 220-228 Issue Date 2000-02 URL http://hdl.handle.net/2433/63667 Right Type Departmental Bulletin Paper Textversion

More information

(Kazuyuki Hasegawa) Department of Mathematics Faculty of Science Science University of Tokyo 1 ff ( ) ([2] [3] [4] [6]) $\nabla$

(Kazuyuki Hasegawa) Department of Mathematics Faculty of Science Science University of Tokyo 1 ff ( ) ([2] [3] [4] [6]) $\nabla$ Title 二次超曲面へのアファインはめ込みの基本定理とその応用 ( 部分多様体の幾何学 ) Author(s) 長谷川 和志 Citation 数理解析研究所講究録 (2001) 1206 107-113 Issue Date 2001-05 URL http//hdlhandlenet/2433/41034 Right Type Departmental Bulletin Paper Textversion

More information

$\sim 22$ *) 1 $(2R)_{\text{}}$ $(2r)_{\text{}}$ 1 1 $(a)$ $(S)_{\text{}}$ $(L)$ 1 ( ) ( 2:1712 ) 3 ( ) 1) 2 18 ( 13 :

$\sim 22$ *) 1 $(2R)_{\text{}}$ $(2r)_{\text{}}$ 1 1 $(a)$ $(S)_{\text{}}$ $(L)$ 1 ( ) ( 2:1712 ) 3 ( ) 1) 2 18 ( 13 : Title 角術への三角法の応用について ( 数学史の研究 ) Author(s) 小林, 龍彦 Citation 数理解析研究所講究録 (2001), 1195: 165-175 Issue Date 2001-04 URL http://hdl.handle.net/2433/64832 Right Type Departmental Bulletin Paper Textversion publisher

More information

Oracle Identity Managementの概要およびアーキテクチャ

Oracle Identity Managementの概要およびアーキテクチャ Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application

More information

76 20 ( ) (Matteo Ricci ) Clavius 34 (1606) 1607 Clavius (1720) ( ) 4 ( ) \sim... ( 2 (1855) $-$ 6 (1917)) 2 (1866) $-4$ (1868)

76 20 ( ) (Matteo Ricci ) Clavius 34 (1606) 1607 Clavius (1720) ( ) 4 ( ) \sim... ( 2 (1855) $-$ 6 (1917)) 2 (1866) $-4$ (1868) $\mathrm{p}_{\mathrm{r}\mathrm{o}\mathrm{g}\mathrm{r}\mathrm{a}}\mathrm{m}\dagger 1$ 1064 1998 75-91 75 $-$ $\text{ }$ (Osamu Kota) ( ) (1) (2) (3) 1. 5 (1872) 5 $ \mathrm{e}t\mathrm{l}\mathrm{a}\mathrm{n}\mathrm{g}\mathrm{e}\mathrm{r}$

More information

Oracle Secure Enterprise Search 10gを使用したセキュアな検索

Oracle Secure Enterprise Search 10gを使用したセキュアな検索 Oracle Secure Enterprise Search 10g 2006 3 Oracle Secure Enterprise Search 10g... 3... 3... 3... 4 Oracle Internet Directory... 4 Microsoft Active Directory... 5... 5 1... 5 2... 6 3 ACL... 6 4 ACL...

More information

第2回_416.ppt

第2回_416.ppt 3 2 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 2-1 2-1-1 (CSRF) 2-1-2 ID 2-1-3 ID 2-1-4 https: 2-1-5 ID 2-1-6 2-1-7 2-2 2-2-1 2-2-2 2-3 2 2-3-1 Web Copyright

More information

XMLアクセス機能説明書

XMLアクセス機能説明書 SolarisTM Solaris Microsoft Windows NT Server network operating system Version 4.0 Windows NT Microsoft Windows 2000 Server operating systemmicrosoft Windows 2000 Advanced Server operating system Windows

More information

( $?^{-\mathrm{b}}$ 17 ( C 152) km ( ) 14 ( ) 5 ( ) $(?^{-}219)$ $\mathrm{m}$ 247 ( ) 6 1 5km

( $?^{-\mathrm{b}}$ 17 ( C 152) km ( ) 14 ( ) 5 ( ) $(?^{-}219)$ $\mathrm{m}$ 247 ( ) 6 1 5km 1257 2002 150-162 150 Abstract When was the Suanshushu edited? * JOCHI Shigeru The oldest mathematical book in China whose name is the Suanshushu was unearthed in the Zhangjiashan ruins, Jiangsha City,

More information

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved. Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise

More information

Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21

Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21 Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21 ... 2... 3...3...4...5 Oracle9i Platform...10 Oracle Collaboration Suite...12...15...23

More information

shio_20041004.PDF

shio_20041004.PDF JPNIC JPCERT/CC 2004 Web 2004 10 4 Web Web Web WASC Web Application Security Consortium 7 Web Security Threat Classification Web URL 2 ...?? It depends!? It depends!??? 3 ? It depends!...

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

REJECT}$ 11^{\cdot}\mathrm{v}\mathrm{e}$ virtual turning point II - - new Stokes curve - (Shunsuke SASAKI) RIMS Kyoto University 1

REJECT}$ 11^{\cdot}\mathrm{v}\mathrm{e}$ virtual turning point II - - new Stokes curve - (Shunsuke SASAKI) RIMS Kyoto University 1 高階線型常微分方程式の変形におけるvirtual turning Titlepointの役割について (II) : 野海 - 山田方程式系のnew S curveについて ( 線型微分方程式の変形と仮想的変わり点 ) Author(s) 佐々木 俊介 Citation 数理解析研究所講究録 (2005) 1433: 65-109 Issue Date 2005-05 URL http://hdlhandlenet/2433/47420

More information

}\llcorner\backslash$ : (Michiyo Nakane) Seijo University St Pauls University 1 \searrow Maxwell Maxwell 1 Maxwe Maxwe $\mathrm{a}\ma

}\llcorner\backslash$ : (Michiyo Nakane) Seijo University St Pauls University 1 \searrow Maxwell Maxwell 1 Maxwe Maxwe $\mathrm{a}\ma Title 最近の数学史の研究方法 : 数学史のオリジナリティーとは何か ( 数学史の研究 ) Author(s) 中根 美知代 Citation 数理解析研究所講究録 (2002) 1257: 1-12 Issue Date 2002-04 URL http://hdlhandlenet/2433/41921 Right Type Departmental Bulletin Paper Textversion

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved. 3 Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved.

Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved. 3 Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved. 2006 12 14 Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved. 2 Copyright 2006 Mitsui Bussan Secure Directions, Inc. All Rights Reserved. 3 Copyright 2006 Mitsui Bussan Secure Directions,

More information

$\text{ ^{ } }\dot{\text{ }}$ KATSUNORI ANO, NANZAN UNIVERSITY, DERA MDERA, MDERA 1, (, ERA(Earned Run Average) ),, ERA 1,,

$\text{ ^{ } }\dot{\text{ }}$ KATSUNORI ANO, NANZAN UNIVERSITY, DERA MDERA, MDERA 1, (, ERA(Earned Run Average) ),, ERA 1,, 併殺を考慮したマルコフ連鎖に基づく投手評価指標とそ Titleの 1997 年度日本プロ野球シーズンでの考察 ( 最適化のための連続と離散数理 ) Author(s) 穴太, 克則 Citation 数理解析研究所講究録 (1999), 1114: 114-125 Issue Date 1999-11 URL http://hdlhandlenet/2433/63391 Right Type Departmental

More information

90 2 3) $D_{L} \frac{\partial^{4}w}{\mathrm{a}^{4}}+2d_{lr}\frac{\partial^{4}w}{\ ^{2}\Phi^{2}}+D_{R} \frac{\partial^{4}w}{\phi^{4}}+\phi\frac{\partia

90 2 3) $D_{L} \frac{\partial^{4}w}{\mathrm{a}^{4}}+2d_{lr}\frac{\partial^{4}w}{\ ^{2}\Phi^{2}}+D_{R} \frac{\partial^{4}w}{\phi^{4}}+\phi\frac{\partia REJECT} \mathrm{b}$ 1209 2001 89-98 89 (Teruaki ONO) 1 $LR$ $LR$ $\mathrm{f}\ovalbox{\tt\small $L$ $L$ $L$ R $LR$ (Sp) (Map) (Acr) $(105\cross 105\cross 2\mathrm{m}\mathrm{m})$ (A1) $1$) ) $2$ 90 2 3)

More information

Web Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App

Web Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App Web 2005 12 15 XML Day XML matsu@kabuki.tel.co.jp 2005 1 1 Web Web Web 2005 2 2 Web 2005 3 3 Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App 2005 4 4 SOAP Crypto-Gram

More information

untitled

untitled Windows Internet Information Server SQL Server 2 Explorer 3 MMC MMC mmc /a SQL Enterprise Manager IIS 4 MMC 5 MMC 6 Internet Information Server IIS %SystemRoot% system32 Logfiles IIS Web 8 IIS 9 ODBC Windows

More information

Wolfram Alpha と数学教育 (数式処理と教育)

Wolfram Alpha と数学教育 (数式処理と教育) 1735 2011 107-114 107 Wolfram Alpha (Shinya Oohashi) Chiba prefectural Funabashi-Asahi Highschool 2009 Mathematica Wolfram Research Wolfram Alpha Web Wolfram Alpha 1 PC Web Web 2009 Wolfram Alpha 2 Wolfram

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,

More information

JavaScript MathTOUCH (Shizuka Shirai) Graduate School of Human Environmental Sciences, Mukogawa Women s University (Tetsuo Fukui) S

JavaScript MathTOUCH (Shizuka Shirai) Graduate School of Human Environmental Sciences, Mukogawa Women s University (Tetsuo Fukui) S Title JavaScript 版数式入力インタフェース MathTOUCH の試作 ( 数学ソフトウェアとその効果的教育利用に関する研究 ) Author(s) 白井, 詩沙香 ; 福井, 哲夫 Citation 数理解析研究所講究録 (2015), 1951: 34-39 Issue Date 2015-06 URL http://hdl.handle.net/2433/223967 Right

More information

44 $d^{k}$ $\alpha^{k}$ $k,$ $k+1$ k $k+1$ dk $d^{k}=- \frac{1}{h^{k}}\nabla f(x)k$ (2) $H^{k}$ Hesse k $\nabla^{2}f(x^{k})$ $ff^{k+1}=h^{k}+\triangle

44 $d^{k}$ $\alpha^{k}$ $k,$ $k+1$ k $k+1$ dk $d^{k}=- \frac{1}{h^{k}}\nabla f(x)k$ (2) $H^{k}$ Hesse k $\nabla^{2}f(x^{k})$ $ff^{k+1}=h^{k}+\triangle Method) 974 1996 43-54 43 Optimization Algorithm by Use of Fuzzy Average and its Application to Flow Control Hiroshi Suito and Hideo Kawarada 1 (Steepest Descent Method) ( $\text{ }$ $\mathrm{m}\mathrm{e}\mathrm{t}\mathrm{h}_{0}\mathrm{d}$

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

128 Howarth (3) (4) 2 ( ) 3 Goldstein (5) 2 $(\theta=79\infty^{\mathrm{o}})$ : $cp_{n}=0$ : $\Omega_{m}^{2}=1$ $(_{\theta=80}62^{\mathrm{o}})$

128 Howarth (3) (4) 2 ( ) 3 Goldstein (5) 2 $(\theta=79\infty^{\mathrm{o}})$ : $cp_{n}=0$ : $\Omega_{m}^{2}=1$ $(_{\theta=80}62^{\mathrm{o}})$ 1075 1999 127-142 127 (Shintaro Yamashita) 7 (Takashi Watanabe) $\mathrm{n}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{m}\mathrm{u}\mathrm{f}\mathrm{a}\rangle$ (Ikuo 1 1 $90^{\mathrm{o}}$ ( 1 ) ( / \rangle (

More information

HTTP Web Web RFC2616 HTTP/1.1 Web Apache Tomcat (Servlet ) XML Xindice Tomcat 6-2

HTTP Web Web RFC2616 HTTP/1.1 Web Apache Tomcat (Servlet ) XML Xindice Tomcat 6-2 HTTP 6-1 HTTP Web Web RFC2616 HTTP/1.1 Web Apache Tomcat (Servlet ) XML Xindice Tomcat 6-2 HTTP ( ) ( ) (GET, POST ) (Host ) Tomcat Servlet Examples / Request Headers ( ) (200, 404 ) (Content-Type ) 6-3

More information

NEEDS Yahoo! Finance Yahoo! NEEDS MT EDINET XBRL Magnetic Tape NEEDS MT Mac OS X Server, Linux, Windows Operating System: OS MySQL Web Apache MySQL PHP Web ODBC MT Web ODBC LAMP ODBC NEEDS MT PHP: Hypertext

More information

Javaセミナー資料.PDF

Javaセミナー資料.PDF Framework for Java 1 Java Java Framework for Java (PMS/Win PMS/Javac) Framework 2 Java 3 C/S WWW PC TCO 4 JAVA JAVA (write once run anywhere) 5 Java Applet Servlet Java Web Application Server Servlet 6

More information

Wolfram Alpha と CDF の教育活用 (数学ソフトウェアと教育 : 数学ソフトウェアの効果的利用に関する研究)

Wolfram Alpha と CDF の教育活用 (数学ソフトウェアと教育 : 数学ソフトウェアの効果的利用に関する研究) 1780 2012 119-129 119 Wolfram Alpha CDF (Shinya OHASHI) Chiba prefectural Funabashi-Keimei Highschool 1 RIMS Wolfram Alpha Wolfram Alpha Wolfram Alpha Wolfram Alpha CDF 2 Wolfram Alpha 21 Wolfram Alpha

More information

Oracle Application Server 10gリリース2( )Oracle HTTP Serverの概要

Oracle Application Server 10gリリース2( )Oracle HTTP Serverの概要 Oracle Application Server 10g 2 10.1.2.0.2 Oracle HTTP Server 2005 10 Oracle Application Server 10g Oracle HTTP Server... 3 OHS:... 4 Web... 4... 4 OHS: Web... 5... 5 Oracle HTTP Server... 5... 7 OHS...

More information

FileMaker Server Help

FileMaker Server Help FileMaker Server 13 FileMaker Server 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect

More information

$\mathrm{c}_{j}$ $u$ $u$ 1: (a) (b) (c) $y$ ($y=0$ ) (a) (c) $i$ (soft-sphere) ( $m$:(mj) $\sigma$:(\sigma j) $i$ $(r_{1j}.$ $j$ $r_{i}$ $r_{j}$ $=r:-

$\mathrm{c}_{j}$ $u$ $u$ 1: (a) (b) (c) $y$ ($y=0$ ) (a) (c) $i$ (soft-sphere) ( $m$:(mj) $\sigma$:(\sigma j) $i$ $(r_{1j}.$ $j$ $r_{i}$ $r_{j}$ $=r:- 1413 2005 60-69 60 (Namiko Mitarai) Frontier Research System, RIKEN (Hiizu Nakanishi) Department of Physics, Faculty of Science, Kyushu University 1 : [1] $[2, 3]$ 1 $[3, 4]$.$\text{ }$ [5] 2 (collisional

More information

組織変更ライブラリ

組織変更ライブラリ 2003 6 1...1 2...2 3...4 3.1...4 3.2...5 3.3...6 3.4...6 4...7 4.1...7 4.2...9 4.3...9 4.4...10 4.5...10 5 Web...11 5.1 WebUI...11 5.2Oracle 9iFS WebUI...12 6Oracle9i AS...13 6.1OiD...13 6.2 SSO...13 7...14

More information

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8 2001/1/11 Web Simplified Techniques for Econometric Plannings & Simulations for WWW Fujiwara Takamichi 97-5075 N-23 Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3.

More information

Oracle Application Server 10g Release 3(10.1.3)Oracle HTTP Serverの概要

Oracle Application Server 10g Release 3(10.1.3)Oracle HTTP Serverの概要 Oracle Application Server 10g Release 3 10.1.3 Oracle HTTP Server Oracle 2005 12 Oracle Application Server 10g Oracle HTTP Server... 3 OHS:... 3 Oracle HTTP Server... 4 Apache : HTTP v1.1... 4 Apache 2.0...

More information

a) \mathrm{e}.\mathrm{t}\mathrm{o}\mathrm{t}\mathrm{t}\mathrm{o}\mathrm{r}\mathrm{i}$ -u.ac $\mathrm{f}$ 0$ (Yoshinobu Tamura) D

a) \mathrm{e}.\mathrm{t}\mathrm{o}\mathrm{t}\mathrm{t}\mathrm{o}\mathrm{r}\mathrm{i}$ -u.ac $\mathrm{f}$ 0$ (Yoshinobu Tamura) D a) \mathrm{e}\mathrm{t}\mathrm{o}\mathrm{t}\mathrm{t}\mathrm{o}\mathrm{r}\mathrm{i}$ -uac $\mathrm{f}$ 0$ 1373 2004 110-118 110 (Yoshinobu Tamura) Department of Information $\mathrm{y}$ (S geru (Mitsuhiro

More information

作図ツール GC/html5 ビューア版の開発と iPad を使った教育実践 (数学ソフトウェアと教育 : 数学ソフトウェアの効果的利用に関する研究)

作図ツール GC/html5 ビューア版の開発と iPad を使った教育実践 (数学ソフトウェアと教育 : 数学ソフトウェアの効果的利用に関する研究) 1780 2012 243-254 243 GC/html5 ipad (Yasuyuki Iijima) Department of Mathematics Education, Aichi University of Education 1 1.1 GC Geometric Constructor( GC ) (2010) DOS 1989 Windows 1998 Java 2000 1990

More information

Plone Web Plone OpenID 1.4 Gracie Gracie OpenID Python Plone GNU GPL Plone Gracie Password Authentication Module (PAM) UNIX OpenID 1. OpenID 2 OpenID

Plone Web Plone OpenID 1.4 Gracie Gracie OpenID Python Plone GNU GPL Plone Gracie Password Authentication Module (PAM) UNIX OpenID 1. OpenID 2 OpenID Technical Reports on Information and Computer Science from Kochi Vol. 1 (2009), No. 2 Web OpenID 1, 2 Plone/ArcheTypes Web DB Web OpenID OpenID OpenID Provider Relying Party DB Web OpenID Apache httpd

More information

WebOS aplat WebOS WebOS 3 XML Yahoo!Pipes Popfry UNIX grep awk XML GUI WebOS GUI GUI 4 CUI

WebOS aplat WebOS WebOS 3 XML Yahoo!Pipes Popfry UNIX grep awk XML GUI WebOS GUI GUI 4 CUI 7 XML Week Web WebOS WebShell WebOS WebOS GUI WebOS WebOS 2 WebOS aplat WebOS WebOS 3 XML Yahoo!Pipes Popfry UNIX grep awk XML GUI WebOS GUI GUI 4 CUI CUI JavaScript I/O CommandClass WebShell webshell

More information

FA - : (FA) FA [3] [4] [5] 1.1 () 25 1:

FA - : (FA) FA [3] [4] [5] 1.1 () 25 1: 得点圏打率 盗塁 併殺を考慮した最適打順決定モデル Titleについて : FA 打者トレード戦略の検討 ( 不確実性の下での数理モデルとその周辺 ) Author(s) 穴太, 克則 ; 高野, 健大 Citation 数理解析研究所講究録 (2015), 1939: 133-142 Issue Date 2015-04 URL http://hdl.handle.net/2433/223766

More information

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener 22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 11 2004-2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. FileMaker, Inc. FileMaker FileMaker,

More information

LAN IP MAC IP MAC MAC IP IP IP IP IP IP [1][2][3] [4][5] IP IP IP IP (MARS MAC Address Reporting System) [6] IP IP MAC 2 MAC MATT MAC Address Tracing

LAN IP MAC IP MAC MAC IP IP IP IP IP IP [1][2][3] [4][5] IP IP IP IP (MARS MAC Address Reporting System) [6] IP IP MAC 2 MAC MATT MAC Address Tracing 学 術 情 報 処 理 研 究 No.18 2014 pp.81 89 MARS Design, Implementation and its Operation of MARS: the terminal monitoring system in Local Area Network, Yutaka KAWAHASHI, Shou SAKATA yutaka@center.wakayama-u.ac.jp,

More information

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ 6 : JavaScript 2 : Web Web HTTPS : Web : Web, Internet Week 1 / 23 2 / 23 Web Web : HTTP: ( ) TCP: IP: ( ) Web 3 / 23 Basic (base64 ) ( ) Digest md5 Basic (nonce) hidden

More information

Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: Issue Date URL

Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: Issue Date URL Title 疑似乱数生成器の安全性とモンテカルロ法 ( 確率数値解析に於ける諸問題,VI) Author(s) 杉田, 洋 Citation 数理解析研究所講究録 (2004), 1351: 33-40 Issue Date 2004-01 URL http://hdlhandlenet/2433/64973 Right Type Departmental Bulletin Paper Textversion

More information

$\langle$ 1 177 $\rangle$ $\langle 4\rangle(5)\langle 6$ ) 1855 ( 2 ) (2) 10 (1877 )10 100 (The Tokyo llathematical Society) 11 ( ) ( ) 117 ( ) ( ), (

$\langle$ 1 177 $\rangle$ $\langle 4\rangle(5)\langle 6$ ) 1855 ( 2 ) (2) 10 (1877 )10 100 (The Tokyo llathematical Society) 11 ( ) ( ) 117 ( ) ( ), ( 1195 2001 176-190 176 $\mathrm{w}_{b\gamma_{\mapsto\infty}}\cdot\cdot\leftrightarrow \mathfrak{b}\infty-\mathrm{f}\mathrm{f}\mathrm{l}$ffi Facul y of Economics, Momoyama Gakuin Univ. (Hiromi Ando) (1)

More information

$\mathbb{h}_{1}^{3}(-c^{2})$ 12 $([\mathrm{a}\mathrm{a}1 [\mathrm{a}\mathrm{a}3])$ CMC Kenmotsu-Bryant CMC $\mathrm{l}^{3}$ Minkowski $H(\neq 0)$ Kenm

$\mathbb{h}_{1}^{3}(-c^{2})$ 12 $([\mathrm{a}\mathrm{a}1 [\mathrm{a}\mathrm{a}3])$ CMC Kenmotsu-Bryant CMC $\mathrm{l}^{3}$ Minkowski $H(\neq 0)$ Kenm 995 1997 11-27 11 3 3 Euclid (Reiko Aiyama) (Kazuo Akutagawa) (CMC) $H$ ( ) $H=0$ ( ) Weierstrass $g$ 1 $H\neq 0$ Kenmotsu $([\mathrm{k}])$ $\mathrm{s}^{2}$ 2 $g$ CMC $P$ $([\mathrm{b}])$ $g$ Gauss Bryant

More information

: ( ) (Takeo Suzuki) Kakegawa City Education Center Sizuoka Prif ] [ 18 (1943 ) $A $ ( : ),, 1 18, , 3 $A$,, $C$

: ( ) (Takeo Suzuki) Kakegawa City Education Center Sizuoka Prif ] [ 18 (1943 ) $A $ ( : ),, 1 18, , 3 $A$,, $C$ Title 九州大学所蔵 : 中国暦算書について ( 数学史の研究 ) Author(s) 鈴木, 武雄 Citation 数理解析研究所講究録 (2009), 1625: 244-253 Issue Date 2009-01 URL http://hdlhandlenet/2433/140284 Right Type Departmental Bulletin Paper Textversion

More information

複数の $\delta$ 関数を初期データに持つ非線形シュレー Titleディンガー方程式について ( スペクトル 散乱理論とその周辺 ) Author(s) 北, 直泰 Citation 数理解析研究所講究録 (2006), 1479: Issue Date URL

複数の $\delta$ 関数を初期データに持つ非線形シュレー Titleディンガー方程式について ( スペクトル 散乱理論とその周辺 ) Author(s) 北, 直泰 Citation 数理解析研究所講究録 (2006), 1479: Issue Date URL 複数の $\delta$ 関数を初期データに持つ非線形シュレー Titleディンガー方程式について ( スペクトル 散乱理論とその周辺 ) Author(s) 北 直泰 Citation 数理解析研究所講究録 (2006) 1479: 142-161 Issue Date 2006-04 URL http://hdlhandlenet/2433/58020 Right Type Departmental

More information

Title 素数判定の決定的多項式時間アルゴリズム ( 代数的整数論とその周辺 ) Author(s) 木田, 雅成 Citation 数理解析研究所講究録 (2003), 1324: Issue Date URL

Title 素数判定の決定的多項式時間アルゴリズム ( 代数的整数論とその周辺 ) Author(s) 木田, 雅成 Citation 数理解析研究所講究録 (2003), 1324: Issue Date URL Title 素数判定の決定的多項式時間アルゴリズム ( 代数的整数論とその周辺 ) Author(s) 木田 雅成 Citation 数理解析研究所講究録 (2003) 1324: 22-32 Issue Date 2003-05 URL http://hdlhandlenet/2433/43143 Right Type Departmental Bulletin Paper Textversion

More information

1 1 1.......................... 1 2.......................... 2 2 5 1........................... 5 2................... 7 3..................... 8 4..

1 1 1.......................... 1 2.......................... 2 2 5 1........................... 5 2................... 7 3..................... 8 4.. CD 1 1 1.......................... 1 2.......................... 2 2 5 1........................... 5 2................... 7 3..................... 8 4......................... 13 5 CD.................

More information

C3印刷用.PDF

C3印刷用.PDF [ C-3 ] Oracle8i On Windows Agenda Windows Oracle8i Oracle8i for Windows NT/2000 R8.1.7 Oracle HTTP Server Oracle intermedia Oracle Workflow Windows Oracle8i for Windows Oracle8i Enterprise Edition Oracle8i

More information

FileMaker Server Help

FileMaker Server Help FileMaker Server 11 FileMaker Server 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. FileMaker, Inc. FileMaker

More information

Title ゾウリムシの生物対流実験 ( 複雑流体の数理とその応用 ) Author(s) 狐崎, 創 ; 小森, 理絵 ; 春本, 晃江 Citation 数理解析研究所講究録 (2006), 1472: Issue Date URL

Title ゾウリムシの生物対流実験 ( 複雑流体の数理とその応用 ) Author(s) 狐崎, 創 ; 小森, 理絵 ; 春本, 晃江 Citation 数理解析研究所講究録 (2006), 1472: Issue Date URL Title ゾウリムシの生物対流実験 ( 複雑流体の数理とその応用 ) Author(s) 狐崎, 創 ; 小森, 理絵 ; 春本, 晃江 Citation 数理解析研究所講究録 (2006), 1472: 129-138 Issue Date 2006-02 URL http://hdl.handle.net/2433/48126 Right Type Departmental Bulletin

More information

wide94.dvi

wide94.dvi 14 WWW 397 1 NIR-TF UUCP ftp telnet ( ) WIDE Networked Information Retrieval( NIR ) vat(visual Audio Tool) nv(netvedeo) CERN WWW(World Wide Web) WIDE ISODE WIDE project WWW WWW 399 400 1994 WIDE 1 WIDE

More information

DP (Katsuhisa Ohno) Nagoya Institute of Technology 1 2 OR ) (make-to-order system) (Jrr) ( G2 ) 5 G2 Jff $\Gamma\Gamma$ JIT 2) (

DP (Katsuhisa Ohno) Nagoya Institute of Technology 1 2 OR ) (make-to-order system) (Jrr) ( G2 ) 5 G2 Jff $\Gamma\Gamma$ JIT 2) ( Title ニューロ $\mathbf{dp}$ による生産ラインの最適制御 ( 不確実性の下での意思決定の数理 ) Author(s) 大野 勝久 Citation 数理解析研究所講究録 (23) 136: 73-82 Issue Date 23-2 URL http://hdlhandlenet/2433/4288 Right Type Departmental Bulletin Paper Textversion

More information

FileMaker Server 9 Getting Started Guide

FileMaker Server 9 Getting Started Guide FileMaker Server 10 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento Bento FileMaker, Inc. Mac Mac Apple Inc. FileMaker

More information

第3回_416.ppt

第3回_416.ppt 3 3 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 3-1 3-1-1 SQL #1 3-1-2 SQL #2 3-1-3 3-1-4 3-2 3-2-1 #2 3-2-2 #1 3-2-3 HTTP 3-3 3-3-1 3-3-2 Copyright 2010

More information

BIG‑IP Access Policy Manager | F5 Datasheet

BIG‑IP Access Policy Manager | F5 Datasheet 2 3 5 7 8 Secure Web Gateway 10 12 BIG-IP APM 13 F5 Global Services 13 13 BIG-IP Access Policy Manager (APM) LAN BIG-IP APM IT LAN 1 Web OAM XenApp Exchange Web Web Web Web Web web BIG-IP APM LAN IT /

More information

XML ( ) XML XML jedit XML XPath XSLT jedit JAVA VM jedit Slava Pestov GNU GPL ( ) jedit jedit ( jedit XML jed

XML ( ) XML XML jedit XML XPath XSLT jedit JAVA VM jedit Slava Pestov GNU GPL ( ) jedit jedit (  jedit XML jed XML XML XML jedit XML XPath XSLT jedit JAVA VM jedit Slava Pestov GNU GPL ( jedit jedit (http://www.jedit.org/index.php jedit XML jedit Plugin Central (http://plugins.jedit.org/ jedit Java (Java VM = Java

More information

403-0702_‚Ofl¼

403-0702_‚Ofl¼ HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3

More information

(Osamu Ogurisu) V. V. Semenov [1] :2 $\mu$ 1/2 ; $N-1$ $N$ $\mu$ $Q$ $ \mu Q $ ( $2(N-1)$ Corollary $3.5_{\text{ }}$ Remark 3

(Osamu Ogurisu) V. V. Semenov [1] :2 $\mu$ 1/2 ; $N-1$ $N$ $\mu$ $Q$ $ \mu Q $ ( $2(N-1)$ Corollary $3.5_{\text{ }}$ Remark 3 Title 異常磁気能率を伴うディラック方程式 ( 量子情報理論と開放系 ) Author(s) 小栗栖, 修 Citation 数理解析研究所講究録 (1997), 982: 41-51 Issue Date 1997-03 URL http://hdl.handle.net/2433/60922 Right Type Departmental Bulletin Paper Textversion

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 12 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. Bento FileMaker, Inc. FileMaker

More information

Title ウェーブレットのリモートセンシングへの応用 ( ウェーブレットの構成法と理工学的応用 ) Author(s) 新井, 康平 Citation 数理解析研究所講究録 (2009), 1622: Issue Date URL

Title ウェーブレットのリモートセンシングへの応用 ( ウェーブレットの構成法と理工学的応用 ) Author(s) 新井, 康平 Citation 数理解析研究所講究録 (2009), 1622: Issue Date URL Title ウェーブレットのリモートセンシングへの応用 ( ウェーブレットの構成法と理工学的応用 ) Author(s) 新井, 康平 Citation 数理解析研究所講究録 (2009), 1622: 111-121 Issue Date 2009-01 URL http://hdlhandlenet/2433/140245 Right Type Departmental Bulletin Paper

More information

内容 CAS 対応アプリケーションの紹介 熊本大学の事例 CAS 対応サイト アプリの構築方法

内容 CAS 対応アプリケーションの紹介 熊本大学の事例 CAS 対応サイト アプリの構築方法 Web アプリケーションの CAS 対応 熊本大学総合情報基盤センター計算機援用教育研究部門兼 e ラーニング推進機構アプリケーション開発室 准教授永井孝幸 内容 CAS 対応アプリケーションの紹介 熊本大学の事例 CAS 対応サイト アプリの構築方法 http://www.jasig.org/cas/clientintegration/cas-ifying-apps 熊本大学での CAS 利用 大学ポータルを中心とした情報サービス

More information

{K\kern-.20em\lower.5ex\hbox{E}\kern-.125em{TCindy}}による3Dモデル教材の作成 (数学ソフトウェアとその効果的教育利用に関する研究)

{K\kern-.20em\lower.5ex\hbox{E}\kern-.125em{TCindy}}による3Dモデル教材の作成 (数学ソフトウェアとその効果的教育利用に関する研究) 数理解析研究所講究録第 2022 巻 2017 年 112-117 112 l $\Phi \Gamma$Cindy による 3\mathrm{D} モデル教材の作成 長野高専一般科濱口直樹 (Naoki Hamaguchi) Faculty of General Education National Institute of Technology Nagano College 東邦大学理学部 高遠

More information

\mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ). - $\

\mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ). - $\ 1081 1999 84-99 84 \mathrm{n}\circ$) (Tohru $\mathrm{o}\mathrm{k}\mathrm{u}\mathrm{z}\circ 1 $(\mathrm{f}_{\circ \mathrm{a}}\mathrm{m})$ ( ) ( ) - $\text{ }$ 2 2 ( ) $\mathrm{c}$ 85 $\text{ }$ 3 ( 4 )

More information

Windows2000 Edge Components V Edge Components V Java Edge Components

Windows2000 Edge Components V Edge Components V Java Edge Components WebSphere Application Server V5.1 Edge Components V5.1 / CBR Method Ver. 1.0 - Windows 2000 - 1.... 3 2. Windows2000 Edge Components V5.1... 4 2.1.... 4 2.2.... 4 3. Edge Components V5.1... 5 3.1.... 5

More information

Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4

Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4 XML Day Web2.0 REST SOAP SOAP REST WADL, WSDL2.0 REST SOAP " " 2006 12 11 XML Web2.0 SOAP REST 2 Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4 REST Representational State Transfer REST Web URL XML

More information

$/\mathrm{t}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{y}\mathrm{a}$ MIYANO E mail: hirosaki-u.ac.jp 1 ( ) ( ) 1980

$/\mathrm{t}\mathrm{a}\mathrm{k}\mathrm{a}\mathrm{y}\mathrm{a}$ MIYANO E mail: hirosaki-u.ac.jp 1 ( ) ( ) 1980 Title 非線形時系列解析によるカオス性検定 ( 非線形解析学と凸解析学の研究 ) Author(s) 宮野, 尚哉 Citation 数理解析研究所講究録 (2000), 1136: 28-36 Issue Date 2000-04 URL http://hdl.handle.net/2433/63786 Right Type Departmental Bulletin Paper Textversion

More information

112 Landau Table 1 Poiseuille Rayleigh-Benard Rayleigh-Benard Figure 1; 3 19 Poiseuille $R_{c}^{-1}-R^{-1}$ $ z ^{2}$ 3 $\epsilon^{2}=r_{\mathrm{c}}^{

112 Landau Table 1 Poiseuille Rayleigh-Benard Rayleigh-Benard Figure 1; 3 19 Poiseuille $R_{c}^{-1}-R^{-1}$ $ z ^{2}$ 3 $\epsilon^{2}=r_{\mathrm{c}}^{ 1454 2005 111-124 111 Rayleigh-Benard (Kaoru Fujimura) Department of Appiied Mathematics and Physics Tottori University 1 Euclid Rayleigh-B\ enard Marangoni 6 4 6 4 ( ) 3 Boussinesq 1 Rayleigh-Benard Boussinesq

More information

Computer Infrastructure System 1 set main Revision : 1.5 abst Revision : 1.4 tetsuzuki Revision : 1.4 func-common Revision : 1.

Computer Infrastructure System 1 set main Revision : 1.5 abst Revision : 1.4 tetsuzuki Revision : 1.4 func-common Revision : 1. Computer Infrastructure System 1 set 2017 7 2017 7 19 16 26 main Revision : 1.5 abst Revision : 1.4 tetsuzuki Revision : 1.4 func-common Revision : 1.17 cis-services Revision : 1.8 cis-servers Revision

More information

ローカル認証の設定例を含む WLC 5760/3850 Custom WebAuth

ローカル認証の設定例を含む WLC 5760/3850 Custom WebAuth ローカル認証の設定例を含む WLC 5760/3850 Custom WebAuth Document ID: 117728 Updated: 2014 年 6 月 09 日 著者 :Cisco TAC エンジニア Alexander De Menezes および Surendra BG PDF のダウンロード 印刷フィードバック関連製品 Cisco 5700 シリーズワイヤレス LAN コントローラ

More information

2 Java 35 Java Java HTML/CSS/JavaScript Java Java JSP MySQL Java 9:00 17:30 12:00 13: 項目 日数 時間 習得目標スキル Java 2 15 Web Java Java J

2 Java 35 Java Java HTML/CSS/JavaScript Java Java JSP MySQL Java 9:00 17:30 12:00 13: 項目 日数 時間 習得目標スキル Java 2 15 Web Java Java J 1 2018 4 Java 35 35 262.5 30 1 1 1,045,300 653,300 656,000 2017 12 389,300 2,700 2 946,900 554,900 290,900 101,100 1 2 Java Java Java Web Eclipse Java List Set Map StringBuilder HTML/CSS/JavaScript JSP/Servlet

More information

Install.PDF

Install.PDF Oracle OLAP Server R6.3 for Windows NT Oracle OLAP Server R6.3 for Sun SPARC Solaris 1 1. 4 1.1....4 1.2....4 2. Windows NT 5 2.1....5 2.1.1. ID... 5 2.1.2. (Windows NT )... 9 2.2....10 2.2.1. Oracle OLAP

More information

11 Windows XP IP WEP (Web )

11 Windows XP IP WEP (Web ) Docodemo-Net (WEP ) cis-supports 25 11 18 1 Docodemo-Net 3 2 Docodemo-Net 3 3 3 4 3 5 4 5.1 LAN........................................ 4 5.2 LAN........................................ 4 6 5 6.1 LAN........................................

More information

i HTTP Basi

i HTTP Basi 2006 Web page Access Control based on Broadcast Encryption Scheme 5ADRM034 i 1 1 1.1................................. 1 1.2.................................... 1 2 2 2.1......................................

More information

Title 非線形シュレディンガー方程式に対する3 次分散項の効果 ( 流体における波動現象の数理とその応用 ) Author(s) 及川, 正行 Citation 数理解析研究所講究録 (1993), 830: Issue Date URL

Title 非線形シュレディンガー方程式に対する3 次分散項の効果 ( 流体における波動現象の数理とその応用 ) Author(s) 及川, 正行 Citation 数理解析研究所講究録 (1993), 830: Issue Date URL Title 非線形シュレディンガー方程式に対する3 次分散項の効果 ( 流体における波動現象の数理とその応用 ) Author(s) 及川 正行 Citation 数理解析研究所講究録 (1993) 830: 244-253 Issue Date 1993-04 URL http://hdlhandlenet/2433/83338 Right Type Departmental Bulletin Paper

More information