wide95.dvi
|
|
- ありおき ひろもり
- 5 years ago
- Views:
Transcription
1 10 261
2
3 1 1.1 ( ) WWW(World Wide Web) WWW SSL(Secure Socket Layer)[66] SHTTP(Secure Hypertext Transfer Protocol)[67] RSA () ( 1 ( ) S-HTTP SSL 263
4 WIDE ) (CA - Certication Authority) CA CA CA ( ) PEM(Privacy Enhanced Mail) SSL S-HTTP CA 1.3 InterAuth-WG, 10 (a) (VA -Verication Authority) CRL(Certicate Revocation List) VA(Verication Authority) IETF PKIX-WG (Online-Verication Service) [68] (b) ITU-T X.509 X OSI 1 Internet
5 X.509v3 1.1: X.509v3 alternative name DNS certicate policy key attributes key usage restriction basic constraints information access authority key identier CRL distribution point CRL (c)
6 WIDE (d) (e) WWW (1) (2) (3) CA Web Web (f)web Web Web Secure HTTP Web Web
7 (g)ca CA CA (h)pet3 telnet telnet (i) (j) ( ) X.509
8 2 X.509 [69] Certication Authority (CA) version 3 [70] 2.1 X.509 Version 3 ASN.1 Certificate ::= SIGNED { SEQUENCE { version [0] INTEGER { v1(0), v2(1), v3(2) } DEFAULT v1, serialnumber INTEGER, signature AlgorithmIdentifier, issuer Name, validity Validity, subject Name, subjectpublickeyinfo SubjectPublicKeyInfo, issueruniqueid [1] IMPLICIT UniqueIdentifier OPTIONAL, subjectuniqueid [2] IMPLICIT UniqueIdentifier OPTIONAL, extensions [3] Extensions OPTIONAL } } version serial number signature issuer validity subject subject public key info version 1 version 2 version 3 ICAT 268
9 2.2 unique identier version 2 CA BIT STRING PKIX [68] CA ( ) 2.3 issuer / subject alternative name AltNames ::= SEQUENCE OF GeneralName GeneralName ::= CHOICE { othername [0] INSTANCE OF OTHER-NAME, rfc822name [1] IA5String, dnsname [2] IA5String, x400address [3] ORAddress, directoryname [4] Name, edipartyname [5] IA5String, url [6] IA5String } IP 2.4 certicate policy PKIX ISO [70] PolicyInformation ::= SEQUNCE OF SEQUENCE { certpolicyid CERTIFICATE-POLICY.&id, qualifier CERTIFICATE-POLICY.&Qualifier } OPTIONAL } CERTIFICATE-POLICY ::= CLASS { &id OBJECT IDENTIFIER UNIQUE, &Qualifier OPTIONAL } WITH SYNTAX { POLICY-IDENTIFIER &id
10 WIDE [QUALIFIER-TYPE &Qualifier] } VeriSign [71] 2.5 key attributes (private key) KeyAttributes ::= SEQUENCE { keyidentifier KeyIdentifier OPTIONAL, intendedkeyusage KeyUsage OPTIONAL, privatekeyusageperiod PrivateKeyValidity OPTIONAL } KeyIdentifier ::= OCTET STRING PrivateKeyValidity ::= SEQUENCE { notbefore [0] GeneralizedTime OPTIONAL, notafter [1] GeneralizedTime OPTIONAL } KeyUsage ::= BIT STRING { digitalsignature (0), nonrepudiation (1), keyencipherment (2), dataencipherment (3), keyagreement (4), keycertsign (5), offlinecrlsign (6) } 2.6 key usage restriction keyusagerestriction ::= SEQUENCE { certpolicyset SEQUENCE OF CertPolicyId OPTIONAL, -- OID restrictedkeyusage KeyUsage OPTIONAL } 2.7 basic constraints cert path
11 basicconstraints ::= SEQUENCE { subjecttype BIT STRING { ca (0), endentity (1) }, pathlenconstraint INTEGER OPTIONAL, permittedsubtrees SEQUENCE OF GeneralName OPTIONAL, excludedsubtrees SEQUENCE OF GeneralName OPTIONAL } ISO (policy constraints ) 2.8 information access ISO CA 2.9 authority key identier AuthorityKeyId ::= SEQUENCE { keyidentifier [0] KeyIdentifier OPTIONAL, certissuer [1] Name OPTIONAL, certserialnumber [2] CertificateSerialNumber OPTIONAL } KeyIdentifier ::= OCTET STRING CA PKIX 2.10 subject directory name AttributesSyntax ::= SEQUENCE OF Attribute
12 WIDE 2.11 CRL distribution point Certicate Revocation List (CRL) CA CRL CRLDistPointsSyntax ::= SEQUENCE OF DistributionPoint DistributionPoint ::= SEQUENCE { distributionpoint Name, reasons ReasonFlags OPTIONAL } ReasonFlags ::= BIT STRING { unused (0), keycompromise (1), cacompromise (2), affiliationchanged (3), superseded (4), cessationofoperation (5), certificatehold (6) }
13 3 VA VA {VA 3.1 VA CA ( CRL )VA VA / TCP BER / VA primary key attributes CA VA VA VA VA VA CA? DB 8 8 A AU ( CRL) VA
14 WIDE 3.2 VARequest ::= [APPLICATION 1] OPTIONALLY SIGNED SET { version [0] INTEGER default 0, } issuer [1] Name, CHOICE { [2] SEQUENCE { subject Name, issueruniqueidentifier [0] BIT STRING OPTIONAL subjectuniqueidentifier [1] BIT STRING OPTIONAL }, serialnumber [3] INTEGER }, requestverificationdateandtime [4] UTCTime OPTIONAL, requestoriginator [5] Name OPTIONAL, requestidentifier [6] OCTET STRING OPTIONAL 1. version: 2. issuer subject issueruniqueidentifier subjectuniqueidentifier serialnumber: / 3. requestverificationdateandtime: / 4. requestoriginator: () 5. requestidentifier: 3.3 CVSReply ::= [APPLICATION 2] SEQUENCE { SIGNED SET { version [0] INTEGER default 0, issuer [1] Name, CHOICE { [2] SEQUENCE { subject Name, issueruniqueidentifier [0] BIT STRING OPTIONAL subjectuniqueidentifier [1] BIT STRING OPTIONAL }, serialnumber [3] INTEGER }, requestidentifier [4] OCTET STRING OPTIONAL,
15 verificationresult [5] VerificationResult, revokedreason [6] RevokedReason OPTIONAL, revokedorholddateandtime [7] UTCTime OPTIONAL, holdexpirationdateandtime [8] UTCTime OPTIONAL, holdinstructioncode [9] OBJECT IDENTIFIER OPTIONAL, invaliditydateandtime [10] UTCTime OPTIONAL, requesteddateandtime [11] UTCTime OPTIONAL, verificationdateandtime [12] UTCTime, verificationidentifier [13] OCTET STRING OPTIONAL }, CertificationPath OPTIONAL } VerificationResult ::= ENUMERATE { valid (0), notyetvalid (1), finished (2), revoked (3), hold (4) } RevokedReason ::= ENUMERATE { unspecified (0), keycompromise (1), cacompromise (2), affiliationchanged (3), superseded (4), cessationofoperation (5) } 1. version: 2. issuer subject issueruniqueidentifier subjectuniqueidentifier serialnumber: 3. requestidentifier: 4. VerificationResult: hold holdexpirationdate holdinstructioncode 5. revokedreasonflags: 6. revokedorholddateandtime: 7. invaliditydateandtime: 8. requesteddateandtime: 9. verificationdateandtime: / /
16 WIDE 10. verificationidentifier: 11. CertificationPath: 3.4 X.509 Version 3 CA CA
17 CA CA (1) CA CA CA (2) VA 277
18 WIDE A DTS(digital timestamping service) [72] 4.3 ( ) (1)
19 (2) 4.4 CA CA CA CA CA CA CA () CA : CA CA CA ( ) CA : CA CA CA CA CA : CA
20 WIDE VA : VA CA VA CA VA CA ( CRL ) 4.7 CA : CA CA CA CA ID: CA 1 ID ID = ID + CA CA 4.1 < 1 > < 6 > ( 4.1 < 3 > < 6 >) 4.9
21 <3> CA VA <2> <4> <1> <5> <6> <1> <2> CA <3> VA <4> <5> <6> 4.1: 4.10 (1) ( 4.1) 4.2 (2)
22 WIDE 4.1: A B () C 4.2: ( ) A B C () ( ) (100 ) () ( ) (1 ) ( ) () (2.1) () () (2.2) (2.3)
23 (3) ( ) (3.1) 4.1 (3.2) (3.1) 2 (3.3) a) Kerberos[73] Kerberos [74] Kerberos b)
24 WIDE c) (Sp2) Sp2 (Ss2) Sp2 A Bp(Sp2) B S Sp2 ( ) Bp: B Bp(x): x Bp Sp2: S Ss2: S A Ss2( ) B Sp2(Ss2( )) S 4.2: Sp2 Ss2 Sp2 Sp2
25 VA 4.3 ( ) 4.3: 1 (1) VA (1.1)VA VA VA 1Kbyte VA (1.2) VA
26 WIDE (2) ( ) ID VA 2 4.4: ID ( ID+CA + ) ID ID+invalid ID {1994 CA CA ID + secret ID [ ] [] [ ] [invalid] [secret]
27 5 PET PET (Privacy Enhanced Telnet) / PET 5.1. [75] 5.2 " PET
28 WIDE 5.1: Telnet 5.3 PET 2 \ " 5.2: client( )/server( )
29 PK S 2. PK S 3. DEK 1 4. PK S (DEK 1 ) 4. PK S (DEK 1 ) 5. PK S (DEK 1 ) SK S DEK 1 6. DEK 2 8. DEK 1 (DEK 2 ) 9. DEK 1 (DEK 2 ) DEK : 1, 2, PK SK s; c DEK (Data Encryption Key) 1 6 PET RSA DES CFB(Cipher Feed Back)
30 WIDE - 1. CERT S 2. CERT S 3. CERT S CERT I PK I 4. ACK or NACK 5. ACK NACK 6. r 7. r 8. SK C (r) 9. SK C (r) CERT C PK C r r=r 0 ACK r 6= r 0 NACK( ) 5.2: 5.5 PET 2 CERT I r ITU-TS X.509[69] 3
31 : /c=jp/o=icat/ou=certication Authority /c=jp/o=abc/ou=dep./cn=yamada RSA 7e29b196fd3ecead9 111 taro@abc.co.jp md2 with RSA 86d7bc4d24ea 111 [76] A A A B PET \*" 754:/c=JP/o=Certication Authority:/c=JP/o=ABC/ou=Dep./* \:" \*" ABC
32 WIDE PET 1! 2! 7 1! 2! 3! 4! 7 1! 2! 3! 4! 5! 7 1! 2! 3! 4! 6! 7 1! 2! 3! 4! 5! 6! Privacy Enhanced Telnet \telnet" (PET) PET RSA OSISEC RSA DES Eric DES SS2(30MIPS) 8byte CFB 1Mbps 5.9 PET 1. PET PET p(pet p) namachu
33 : PET p; q(256bit ), d(512bit ) n = pq (512bit) e = (17bit) srandam(8) + DESinCipherFeed Back mode (CFB) RSA Quisquarter() ITU-T X.509 Message-Digest MD2 RSA 5.5: [kbps] RSA RSA DES 1974 DES 1917 MD5 3165
34 WIDE % pet namachu Trying Connected to namachu. Escape character is '^]'. You don't set your security level. Now, I set your security level to remote server's security level 5. Remote server is requesting security level 5. We are going to talk on level 5. Now, exchanging a data encryption key. Please wait. Your name is C=JP O=Fujitsu Laboratories Ltd. OU=Information Processing Network Center CN=Yasutsugu Kuroda address=kuroda@flab.fujitsu.co.jp Your certificate is valid. Your authentication is valid. Remote server name is C=JP O=Fujitsu Laboratories Ltd. OU=IPNC CN=namachu.center.flab.fujitsu.co.jp address=kuroda@namachu.center.flab.fuj itsu.co.jp Server's certificate is valid Server's authentication is Valid SunOS UNIX 4.1 (namachu) (ttypb) login: p
35 % pet -p 3 namachu Trying Connected to namachu. Escape character is '^]'. You are requesting security level 3. Remote server is requesting security level 5. We are going to do security level 5. Exchanging data encryption key... Remote server name is C=JP O=Fujitsu Laboratories Ltd. OU=IPNC CN=namachu.center.flab.fujitsu.co.jp address=kuroda@namachu.center.flab.fuji tsu.co.jp Server's certificate is valid Server's authentication is Valid Your name is C=JP O=Fujitsu Laboratories Ltd. OU=Information Processing Network Center CN=Yasutsugu Kuroda address=kuroda@flab.fujitsu.co.jp Your certificate is valid. Your authentication is valid. SunOS UNIX 4.1 (namachu) (ttyp8) login:
36 WIDE % pet -p 4 namachu Trying Connected to namachu. Escape character is '^]'. You are requesting security level 4. Remote server is requesting security level 5. Security level negotiation is fault. telnet PET % pet -p 4 namachu Trying Connected to namachu. Escape character is '^]'. You are requesting security level 4. Remote server is requesting security level 5. Security level negotiation is fault. telnet PET % telnet namachu Trying Connected to namachu. Escape character is '^]'. This server is a Privacy Enhanced Telnet. It is requesting security level 5 communication. Please access it using Privacy Enhanced Telnet at the next time. Bye. Connection closed by foreign host. pet telnetd
37 % pet flab Trying Connected to flab. Escape character is '^]'. SunOS UNIX (azalea) 2. PET3 (petd Makele.generic SERVERMANAGEMENTFILE) F peek % peek -s < CERTFILE >> petuser petuser CERTFILE peek petuser
38 WIDE % peek -c <.cert Serial No = 36F <---- Validity from Z to Z issuer: C=JP O=WIDE OU=Certification Authority subject: C=JP O=Fujitsu Laboratories Ltd. OU=Information Processing Network Center CN=Yasutsugu Kuroda address=kuroda@flab.fujitsu.co.jp signature: md2withrsaencryption publickey: alg = rsaencryption 3. telnetx zmodem, xmodem, bplus TELNETX zmodem text le 6150byte binary 5.10 PET
39 / / X.509 version 3 RSA keyed MD5[77] IETF PET FJPEM[78, 79, 80, 81] IETF PKIX WG(Public Key Interface (X.509) WG) ISPP WG(Internet Secure Payment Protocol WG)
40 WIDE
/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More informationwide97.dvi
11 321 1 CA (Certication Authority) ( ) 1 3 CA S/MIME[104][105][106] SSL[107](Secure Sockets Layer), TLS[108](Transport Layer Security) WWW Netscape Microsoft Web SSL CA CA CA CA CA CA CA members only
More informationはじめに
19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30
More information1. はじめに ブリッジ CA (UTF8) 証明書プロファイル 相互認証証明書 ( ブリッジ CA (UTF8) 組織 CA ) 相互認証証明書 ( ブリッジ CA (UTF8) 政府認証基盤ブリッジ CA )..
C-6-4-4 LGPKI プロファイル設計書 第 1.8 版 平成 30 年 8 月 24 日 地方公共団体情報システム機構 1. はじめに... 1 2. ブリッジ CA (UTF8)... 1 2.1. 証明書プロファイル... 1 2.1.1. 相互認証証明書 ( ブリッジ CA (UTF8) 組織 CA )... 1 2.1.2. 相互認証証明書 ( ブリッジ CA (UTF8) 政府認証基盤ブリッジ
More informationJuniper Networks Corporate PowerPoint Template
Juniper SRX 日本語マニュアル 41. SSL Forward Proxy の CLI 設定 はじめに SRX340 における SSL Forward Proxy の CLI 設定ついて説明します 手順内容は SRX340 JUNOS 15.1X49-D140 にて確認を実施しております SSL Proxy 機能については SRX340 以上の機種にてサポートされています 2018 年 8
More information1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v
More information2
m.uehata@sii.co.jp 2 SII 1881 1892 1937 1959 3 SEIKO 1881 1955 1964 1974 1984 1992 1994 1998 1998 2002 2002 4 SII 1960 1970 1980 1990 CMOS IC LCD LCM 2000 COF 1937 VLSI FIB 5 < > SA EOA CAE < > 6 Network
More informationCisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
More information3. /dev/urandom 1024 ~CA0/private/cakey.pem $ openssl genrsa -rand /dev/urandom -out \ private/cakey.pem 1024 Generating RSA private key
PKI : OpenSSL CA NISOC @ 2007/01/06 1 CA:Certificate Authority OpenSSL CA CA0 CA0 2 CA CA1 CA2 3 CA CA1 CA2 PC CA CA 2 CA CA0 1. CA ~CA0 openssl.cnf [ CA default ] dir ~CA0 [ req distinguished name ] CSR
More informationuntitled
better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge
More informationPKIの標準化動向と リソースPKI
PKI Day 2009 2009 6 24 PKI PKI JPNIC RFC5280 PKI RFC5280 PKI RPKI IP RPKI RFC5280 RFC5280 RFC3280 PKI RFC5280 RFC5280 1/4 RFC5280 X.509-based PKI X.509CRL 2008 5published RFC5280 2/4 1988 1995 1997 1999
More information3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre
3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination
More information電子メールのセキュリティ
S/MIME 1...1 1.1... 1 1.2... 2 1.3... 2 2...3 2.1... 3 2.2... 4 2.3... 4 3...5 3.1... 5 3.2... 6 3.3... 8 3.4... 10 4...12 4.1 PGP... 12 4.2 (CA)... 13 5 CRL...15 5.1 ( ID )... 15 5.2 CRL(Certificate Revocation
More informationdvi
{ SSH { 3 3 1 telnet ID ( ) ID ( 1) SSH(Secure SHell) (ID ) SSH SSH SSH login : userid password : himitsu login : userid psaaword: himitsu login : userid password : himitsu 1. Host 11 7 UNIX ( sakura)
More informationPlease enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: Using con
IIS で SSL(https) を設定する方法 Copyright (C) 2008 NonSoft. All Rights Reserved. IIS でセキュアサーバを構築する方法として OpenSSL を使用した方法を実際の手順に沿って記述します 1. はじめに IIS で SSL(https) を設定する方法を以下の手順で記述します (1) 必要ソフトのダウンロード / インストールする
More informationIW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights
1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless
More information変更履歴 版数日付内容承認者名改訂区分 1.0 平成 26 年 3 月 31 日新規作成新規 1.1 平成 27 年 11 月 30 日設定値の確定に伴う修正及び誤記 訂正 1.2 平成 27 年 12 月 25 日 2 章 署名用電子証明書の プロファイル基本領域 (Basic)
公的個人認証サービス プロファイル仕様書 1.2 版 平成 27 年 12 月 25 日 変更履歴 版数日付内容承認者名改訂区分 1.0 平成 26 年 3 月 31 日新規作成新規 1.1 平成 27 年 11 月 30 日設定値の確定に伴う修正及び誤記 訂正 1.2 平成 27 年 12 月 25 日 2 章 2.2.1. 1 署名用電子証明書の プロファイル基本領域 (Basic) 及 び 2.2.2
More informationYMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
More informationSi-R180 ご利用にあたって
P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More informationIW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN
1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM
More informationwide94.dvi
14 WWW 397 1 NIR-TF UUCP ftp telnet ( ) WIDE Networked Information Retrieval( NIR ) vat(visual Audio Tool) nv(netvedeo) CERN WWW(World Wide Web) WIDE ISODE WIDE project WWW WWW 399 400 1994 WIDE 1 WIDE
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationTS-1009
TS-1009 Technical Specification on Call Interface for SDP Media Negotiation through Provider s SIP Networks(MPEG4-Visual) 2005 8 10 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 2 3 4 1.0 2005 8 10 [1] "SIP:
More informationEpson Print Admin
Epson Print Admin NPD5368-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin Epson Print Admin Epson
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informationEpson Print Admin
Epson Print Admin NPD5369-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin 2 B K L U OS Windows OSWindows 10Windows
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information利用者ガイド NAREGI Middleware UMS (User Management Server) 2008 年 10 月 国立情報学研究所 ドキュメントリスト 管理者ガイドグループ IS(Distributed Information Service) IS(Distributed Information Service) - LRPSConfig - SS(Super Scheduler)
More information第3 章 電子認証技術に関する国際動向
3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.
More information2008, 2009 TOSHIBA TEC CORPORATION All rights reserved
2008, 2009 TOSHIBA TEC CORPORATION All rights reserved 1 2 3 1 2 ... 1 1... 8... 9... 18... 24... 25... 30... 31... 34... 37 E... 67 Bluetooth BIP... 68 2... 71... 73... 100 3 ... 132... 134... 136 E...
More informationCMS長期署名プロファイル(案)
1/22 RFC3126, Electronic Signature Formats for long term electronic signatures (ETSI TS 101 733 V.1.2.2(2000-12)) ETSI TS 101 733 V1.5.1(2003-12), Electronic Signature Formats draft-pinkas-smime-cades-00.txt(2005-7),
More informationGA-1190J
GA-1190J 1 1. 2. 3. 4. 2 5. 3 PDF 4 PDF PDF PDF PDF PDF PDF PDF PDF 5 6 ...1...2...4 1...12 2...16...18 3...22 PCL/PS...23 4...26 5...30 ETHERNET...31 TCP/IP...33 IPX/SPX...38 AppleTalk...40 HTTP...42
More information橡sirahasi.PDF
Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,
More information設定例集_Rev.8.03, Rev.9.00, Rev.10.01対応
Network Equipment 設定例集 Rev.8.03, Rev.9.00, Rev.10.01 対応 2 3 4 5 6 7 8 help > help show command > show command console character administrator pp disable disconnect 9 pp enable save Password: login timer
More informationuntitled
Interfaculty Initiative in Information Studies, The University of Tokyo 2 Interfaculty Initiative in Information Studies, The University of Tokyo > > 517587 82 > > > > > 3 Interfaculty Initiative in Information
More informationMUA (Mail User Agent) MTA (Mail Transfer Agent) DNS (Domain Name System) DNS MUA MTA MTA MUA MB mailbox MB
MUA (Mail User Agent) MTA (Mail Transfer Agent) DNS (Domain Name System) DNS MUA MTA MTA MUA MB mailbox MB »» SMTP MAIL FROM: 250 sender ok RCPT TO: 250 recipient
More information\\afs001-0m0005\project02\A32\M
Technical Information 2004.09 2009.04 Store Request Query Request Retrieve Request DICOM Client Application Remote SCP Remote Query/Retrieve SCP Image Stored * DICOM Server Application Remote SCU Print
More informationwide93.dvi
5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE
More informationRPKI in DNS DAY
RPKI in DNS DAY 木村泰司 2015 年 11 月 19 日 ( 木 ) 発表者 名前 木村泰司 ( きむらたいじ ) 所属 一般社団法人日本ネットワークインフォメーションセンター (JPNIC) CA / RPKI / DNSSEC / セキュリティ情報 : 調査 ( 執筆 ) セミナー 企画 開発 運用 ユーザサポート 業務分野 電子証明書 / RPKI / DNSSEC (DPS/
More informationTya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. M
(Tya-net) Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. Make regular backup of critical data. Don't
More information1. 2. ( ) Secure Secure Shell ssh 5. (xinetd TCP wrappers) 6. (IPsec) 7. Firewall 2
(6 20 ) ISP 3 3 SPAM MP3 1 1. 2. ( ) 3. 4. Secure Secure Shell ssh 5. (xinetd TCP wrappers) 6. (IPsec) 7. Firewall 2 1. 2. ( ) 3. 4. Secure 5. (xinetd TCP wrappers) (i) (ii) ( ) (iii) 6. (IPsec) 7. Firewall
More informationC02.pdf
/ 1999 12 14 Internet Week 99 Internet Week 99 1999 Yu Inamura, Japan Network Information Center 1 2 2000 1. 2. 3. 4. 1976 5. 1993 2.1 N!! N 2.2 1976 Shannon ConfusionDiffusion 2 SPN Substitution Permutation
More informationTM-T88VI 詳細取扱説明書
M00109801 Rev. B 2 3 4 5 6 7 8 9 10 Bluetooth 11 12 Bluetooth 13 14 1 15 16 Bluetooth Bluetooth 1 17 1 2 3 4 10 9 8 7 12 5 6 11 18 1 19 1 3 4 2 5 6 7 20 1 21 22 1 23 24 1 25 SimpleAP Start SSID : EPSON_Printer
More informationTM-m30 詳細取扱説明書
M00094100 Rev. A Seiko Epson Corporation 2015. All rights reserved. 2 3 4 5 6 Bluetooth 7 Bluetooth 8 1 9 Bluetooth 10 1 11 1 2 6 5 4 3 7 12 1 13 14 ONF 1 N O O N O N N N O F N N F N N N N N N F F O O
More informationMicrosoft Word - D JP.docx
Application Service Gateway Thunder/AX Series vthunder ライセンスキー インストール 手順 1 1.... 3 2. vthunder... 3 3. ACOS... 3 4. ID... 5 5.... 8 6.... 8 61... 8 62 GUI... 10 2 1. 概要 2. vthunder へのアクセス 方法 SSHHTTPSvThunder
More informationMac OS X Server Windows NTからの移行
Mac OS X Server Windows NT 10.4 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. Mac OS X Server Apple 1 Infinite Loop Cupertino CA 95014-2084 U.S.A. www.apple.com 163-1480 3 20
More informationTM-m30 詳細取扱説明書
M00094106 Rev. G Seiko Epson Corporation 2015-2018. All rights reserved. 2 3 4 5 6 7 8 Bluetooth 9 ... 71 10 1 11 Bluetooth 12 1 13 1 2 6 5 4 3 7 14 1 1 2 3 4 5 15 16 ONF 1 N O O N O N N N O F N N F N
More information"CAS を利用した Single Sign On 環境の構築"
CAS Single Sign On (Hisashi NAITO) naito@math.nagoya-u.ac.jp Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp, Oct. 19, 2005 Tohoku Univ. p. 1/40 Plan of Talk CAS CAS 2 CAS Single
More informationuntitled
200 7 19 JPCERT [2007 2 4 6 ] IPA JPCERT JPCERT/CC 2007 2 4 6 1 2 1. 2007 2 1 2007 4 1 6 30 IPA 46 95 141 2004 7 8 501 940 1,441 3 2 (1) 3 2004 7 8 1 2007 2 1.98 1 2005/1Q 2005/2Q 2005/3Q 2005/4Q 2006/1Q
More informationOracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
More informationJT-H460.2 H.323 SCN Number Portability Interworking between H.323 and SCN networks 2003 11 27 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE - 2 - 1...5 2...5 3...5 4...6 4.1...7 4.2 ISUP JT-H225.0...7 4.3
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationWIDE 1
WIDE 1 2 Web Web Web Web Web Web Web Web Web Web? Web Web Things to cover Web Web Web Web Caching Proxy 3 Things NOT covered / How to execute Perl Scripts as CGI binaries on Windows NT How to avoid access
More information第2回_416.ppt
3 2 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 2-1 2-1-1 (CSRF) 2-1-2 ID 2-1-3 ID 2-1-4 https: 2-1-5 ID 2-1-6 2-1-7 2-2 2-2-1 2-2-2 2-3 2 2-3-1 Web Copyright
More informationまえがきIntroduction
Array Corporation DICOM Pro Server DICOM 3.0 Conformance Statement 0. INTRODUCTION...3 1. IMPLEMENTATION MODEL...4 1.1...4 1.2...4 1.3...5 2. AE SPECIFICATIONS...6 2.1 DICOM Pro Server...6 2.1.1... 7 2.1.2...
More informationMacintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi
3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More informationDynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.
SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX
More informationuntitled
()IP OSI ( ) (TCP/IP)TCP UDP ( ) IP + IP TCP / Web TCP/UDP IP / LAN IM xdsl/ () (FAX) 6bit(6556) FAX FAX ( ) UDP/TCP UDP(User Datagram Protocol) CL (Connectionless) TCP(Transmission Control Protocol) CO
More information1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student
LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN
More informationuntitled
2004 1094 1.... 1 1.1....1 1.2....3 1.3....3 2. POSTGRESQL... 5 2.1. POSTGRESQL DB UNIX...5 2.2. POSTGRESQL DB WINDOWS...8 3. XML... 12 3.1. XINDICE (NATIVE XML DATABASE)... 12 3.2. XINDICE... 12 3.3.
More informationuntitled
2004 1094 1.... 1 1.1. SIDA IODEF RECEIVER / ARCHIVER...1 1.2. SIDA IODEF GENERATOR...2 1.3. MANUAL AUTHORING...4 1.4. IODEF SENDER...4 1.5. IODEF RECEIVER / ARCHIVER...5 1.6. IODEF ANALYZER...9 2....
More informationWindows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.
Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise
More informationIPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend
1 1 1 1 1 1 SNS(Social Networking Service) SNS Friend News System Friend News System SNS Friend News System 1. [1] 2013 6 Microsoft Facebook SNS(Social Networking Service) [2] Facebook SNS LAN SNS Friend
More informationCisco Aironet 1130AG アクセス ポイント クイック スタート ガイド
CONTENTS 1 IP 2 3 6 7 9 12 15 17 18 IP 20 CLI IP 21 Telnet CLI 23 24 28 802.11G 802.11A 34 38 Express Security 40 Express Security 41 SSID 42 47 LED 48 50 SSID50 WEP 50 51 52 MODE 52 Web 53 55 1 56 IP
More informationTLS 1.2 TLS TLS iijlab-seminar pd
TLS 1.3 2018.2.14 @kazu_yamamoto 1 TLS 1.2 TLS https://www.iij.ad.jp/dev/report/iir/031/03_01.html TLS 1.3 http://seminar-materials.iijlab.net/iijlab-seminar/ iijlab-seminar-20170110.pdf HTTPS SEO https://employment.en-japan.com/engineerhub/
More informationuntitled
PKI 1 / SSL/TLS PKI 28 Oct 2005 PKI /JNSA PKI Day 3 PKI? 2 RFC 2459/RFC 3280/RFC 3280bis CRL(RFC 2459/RFC 3280/RFC 3280bis) OCSP(RFC 2560/Light-weight OCSP) SCVP(SCVP) CMP(RFC 2510/RFC 4210) CRMF(RFC 2511/RFC
More informationのコピー
DNSSEC Masakazu Asama @ NISOC 1 What? DNS SECurity extensions. DNS Resource Record(RR), RR. (Validator) RR. RR. 2 Why? Thread Analysis of the Domain Name System(RFC3833): Packet Interception ID Guessing
More informationERA-201D1
4-652-247-01(1) AIBO LAN ERA-201D1 2000 Sony Corporation 6 8 AIBO b 1 AIBO 2 AIBO LAN AIBO 3 AIBO 2 3 AIBO http://www.aibo.com/ 4 AIBO AIBO OPEN-R OPEN-R MEMORY STICK TM ... 2... 9 AIBO LAN... 11... 12
More information2 BIG-IP 800 LTM v HF2 V LTM L L L IP GUI VLAN.
BIG-IP800 LTM v11.4.0 HF2 V1.0 F5 Networks Japan 2 BIG-IP 800 LTM v11.4.0 HF2 V1.0...1 1....3 1.1. LTM...3 2. L3...4 2.1. L3...4 2.2. L3...5 3....6 3.1....6 3.1.1. IP...6 3.1.2. GUI...10 3.1.3. VLAN...19
More informationWin XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /
SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices
More informationsystem02.dvi
2003 2 2003 4 24 13:15-14:45 : IP DNS SSH SCP 1 HTTP 2 FTP TelnetGopher HTTP HTTP 2 IP 2.1 IP PC1 1 IPv4 IP 8 4 32 192.168.6.18 42 (2 32 ) IP IP LAN LAN LAN ABC 3 (Table 1) 2.2 LAN Table 1 10.0.0.010.255.255.255
More informationTM-m30 詳細取扱説明書
M00094101 Rev. B Seiko Epson Corporation 2015-2016. All rights reserved. 2 3 4 5 6 7 8 Bluetooth 9 Bluetooth 10 1 11 Bluetooth 12 1 13 1 2 6 5 4 3 7 14 1 1 2 3 4 5 15 16 ONF 1 N O O N O N N N O F N N F
More information橡_東_130627ADSL技参資Ver2.PDF
IP ...2...3...3 ADSL...5...5...5...7...7...8...9...10...10...11... 11 1... 11... 11... 11 2...12 PPPoE...12 PPPoE...12 PPPoE...12...14 PPP...25 PPPoE...26 PPP...27 PPP...27 PPP...27 LCP...28 IPCP...29
More informationCPE9V1.0&AP615V2.0-C01说明书-电子档
2018 i IP-COM CPE9V1.0 CPE9V1.0 AP615V2.0 + > > 注意 提示 AP ARP AES CPE CCQ DHCP DNS DDNS GMT IP Access Point Address Resolution Protocol Advanced Encryption Standard Customer Premises Equipment Client Connection
More informationFileMaker Server Getting Started Guide
FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,
More informationFlow Control Information Network 1 /
(2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Flow Control Information Network 1 / 2012 2 Flow Control DLL : Automatic Repeat Request (ARQ) Stop-and-wait
More information日本銀行外為法手続きオンラインシステム用認証局 Certification Practice Statement Symantec Trust Network Certification Practice Statement の付属書 バージョン 年 12 月 18 日 日本銀行
日本銀行外為法手続きオンラインシステム用認証局 Certification Practice Statement Symantec Trust Network Certification Practice Statement の付属書 バージョン 3.3 2017 年 12 月 18 日 日本銀行 商標に関する表示シマンテック (Symantec) ノートン (Norton) およびチェックマークロゴ
More informationict2-.key
IP TCP TCP/IP 1) TCP 2) TCPIP 3) IPLAN 4) IP パケット TCP パケット Ethernet パケット 発信元 送信先 ヘッダ 列番号 ポート番号 TCP パケットのデータ IP パケットのデータ 本当に送りたいデータ データ IP ヘッダデータ部ヘッダデータ部ヘッダデータ部 Ethernet パケット Ethernet パケット Ethernet パケット
More informationtcp/ip.key
IP TCP IP ヘッダデータ部ヘッダデータ部ヘッダデータ部 Ethernet パケット Ethernet パケット Ethernet パケット IP(1) 0 8 16 24 31 () Version IHL () Time To Live () Identification () Type of Service ) Flags Protocol () Source Address IP) Destination
More information2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP
1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,
More informationCisco WebEx ホワイトペーパー: リアルタイムコラボレーションのパワーを解き放つ: Cisco WebEx ソリューションのセキュリティ概要
: Cisco WebEx : Cisco WebEx Cisco WebEx 107-6227 9-7-1 Tel: 03-6434-6044 Fax: 03-5411-9226 Japaninfo@webex.com www.webex.co.jp WebEx Communications, Inc. 3979 Freedom Circle, Santa Clara, CA 95054 USA
More informationuntitled
2004845 PKIUTF8String Part1: UTF8String UTF8String PKI UTF8String UTF8String 2 (1) ( ) A, ü, [ ] [ ] ASCII JIS X2013 Unicode(ISO 10646) ( )( ) Unicode A U+0041 U+007F 3 (2) u ü ( )( ) ( )(
More information---> 1 <------IP configurationの1を選択 2. IP address: Subnet mask: > 2 < IP addressの1を選択 Enter IP address: 192.
スーパーターミナルサーバー STS ターミナルサーバーの設定方法 ----- 内容 ----- 1 はじめに 2 機器接続の仕方 3 初期設定操作の画面 3-1 STS 本体の IP アドレス設定 3-2 ターミナルサーバーの設定方法 4 確認注意事項 ---------------- 1 はじめに初期設定のための接続 2 機器接続の仕方初期設定をする画面を表示したものです 後 各種ターミナルソフトで
More informationguide.PDF
ExpressMail Ver2.0 Copyright ( ) 1998/12/25 REV.1 1 ExpressMail Ver2.0 ExpressMail Ver2.0 ExpressMail Ver2.0 WindowsNT SMTP/POP3/IMAP4 (1) SMTP sendmail 8.8.5 DLL (2) POP3 RFC1939 APOP (3) IMAP4 RFC2060
More informationSR-X526R1 サーバ収容スイッチ ご利用にあたって
SR-X526R1 P3NK-3432-05Z0 526R1 V01 SR-X526R1 V01 2009 10 2010 4 2 2011 5 3 2012 3 4 2012 11 5 Microsoft Corporation Copyright FUJITSU LIMITED 2009-2012 2 SR-X526R1 V01...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...13...13...13
More informationsp c-final
NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation
More information磁気ディスクへの記録方式に関する告示
第 1 電磁的記録への記録方式 1 使用する電磁的記録媒体 (1) 商業登記規則第 33 条の 6 第 4 項第 1 号の光ディスク ( 以下 申請用光ディスク とい う ) のトラックフォーマットは 工業標準化法 ( 昭和 24 年法律第 185 号 ) に基づく日本 工業規格 ( 以下 日本工業規格 という )X6241 又は X6281 に適合する直径 120 ミリメ ートルの光ディスクの再生装置で再生することが可能なものによる
More informationMOTIF XF 取扱説明書
MUSIC PRODUCTION SYNTHESIZER JA 2 (7)-1 1/3 3 (7)-1 2/3 4 (7)-1 3/3 5 http://www.adobe.com/jp/products/reader/ 6 NOTE http://japan.steinberg.net/ http://japan.steinberg.net/ 7 8 9 A-1 B-1 C0 D0 E0 F0 G0
More informationLync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web
1.1 Microsoft Lync Server 2010 BIG-IP LTM 2 4 5 BIG-IP : Lync 6 BIG-IP : Lync 7 BIG-IP : - 8 BIG-IP : - 9 A: BIG-IP Microsoft Lync Server 2010 Microsoft Lync Server 2010 Office Communications Server BIG-IP
More informationSR-X324T1/316T1 サーバ収容スイッチ ご利用にあたって
SR-X324T1/316T1 P3NK-4092-04Z0 324T1/316T1 V01 SR-X324T1/316T1 V01 2010 4 2011 5 2 2012 3 3 2012 11 4 Microsoft Corporation Copyright FUJITSU LIMITED 2010-2012 2 SR-X324T1/316T1 V01...2...5...5...5...5...6...7...8...8...11...11...11...11...11...11...12...12...12...12...12...13...13
More informationmain2.dvi
15 WWW 501 1 W4C WG 1 WWW (HTTP[53, 22]) WIDE WWW 1997 3 WIDE WWW WIDE CacheBone WG 2 WWW WG WWW W4C WG 2 WIDE CacheBone 3 4 5 6 WWW 1 W4C WG:WIDE World-Wide Web Cache Working Group 503 2 WIDE CacheBone
More informationOracle Secure Enterprise Search 10gを使用したセキュアな検索
Oracle Secure Enterprise Search 10g 2006 3 Oracle Secure Enterprise Search 10g... 3... 3... 3... 4 Oracle Internet Directory... 4 Microsoft Active Directory... 5... 5 1... 5 2... 6 3 ACL... 6 4 ACL...
More information128 64 32 16 8bit 7bit 6bit 5bit 4bit 3bit 2bit 1bit 8 4 2 1 3.6m 4.5m 5.5m 6.4m Tokyo:3.6m 3.6m 4.5m 3.6m 5.5m 6.4m JCSAT-3 AI 3 Hub WIDE Internet 2Mbps VSAT point-to-point/multicst
More informationNAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for
NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki
More information<Documents Title Here>
Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone
More informationTeradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi
PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici
More information