25 About what prevent spoofing of misusing a session information

Size: px
Start display at page:

Download "25 About what prevent spoofing of misusing a session information"

Transcription

1 25 About what prevent spoofing of misusing a session information

2 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i

3 Abstract About what prevent spoofing of misusing a session information Hiroki TAHARA It s increasing XSS(cross-site scripting) in a web-application vulnerability recently. XSS is used for one of a misusing session information. And a attacker get spoofing with the misusing session information. In this paper, I have proposed to prevent spoofing using SAS-2(Simple And Secure password authentication protocol, ver.2) to confirm a regular user when a session information leak. And i was to evaluate safety and compare the preceding method. key words Session-management, XSS, SAS-2 ii

4 ID ID ID HTML HTML ID Cookie SAS SAS iii

5 SAS ID Cookie iv

6 ID ID ID SAS SAS i i v

7 vi

8 1 web SNS EC SNS EC Web ID ID HTTP ID Web ID ID 1

9 2 2.1 Web 2.1 Web Web Web Web Web Web Web ID ID Web ID Web 2

10 2.2 ID ID ID Cookie 2.2 Cookie Web Web HTTP Cookie ID Cookie Web Cookie Web HTTP Cookie Web Cookie ID Cookie Web Web Web Web Cookie [4][7] A 3

11 ID A ID ID A A [2] ID ID ID 4

12 ID ID ID 2.5 ID 5

13 2.3 ID ID 2.6 ID ID [2] ID 2.3 HTTP [8][9] 6

14 2.3 Cookie Cookie ID URL Cookie ID 2.7 7

15 [2] HTML HTML HTML HTML < > & HTML < > & HTML HTML HTML <script> javascript: <xscript> xjavascript: java&#09:script javascript: HTML 8

16 2.3 HTTP Content-Type Content-Type: text/html: charset=utf-8 charset HTML Content-Type HTML +ADw-script+AD4-alert(+ACI-test+ACI- )+ADsAPA-/script+AD4- UTF- <script>alter( test );</script> 2.8 9

17 IPA [1] ID ID ID 2 ID Cookie 10

18 2.4 ID ID ID ID ID ID Cookie ID Cookie Cookie Web javascript ID ID Cookie Web 2 11

19 3 ID Cookie SAS-2(Simple And Secure password authentication protocol, Ver.2) SAS SAS-2 SAS-2 SAS-2 [3][5][6] User Server User ID 12

20 3.1 SAS-2 S X F H H(x) x i N i i SAS-2 SAS-2 SAS SAS-2 1. ID S N 1 ID S N 1 A=X(ID S N 1 ) 2. ID A 3. ID A 13

21 3.1 SAS SAS-2 SAS i SAS-2 1. ID S N i A=X(ID S N i ) N i+1 User Server =C (F(C)+A) =F(C) A 2. ID Input ID,S Generates a rondom number N1 3. and Stores N1 A F(C) = A A=X(ΙD,S N1) C= (F(C)+A) F(C) F(ID, C) ID,Α (secure) Stores ID,A 14

22 3.1 SAS-2 4. A C = H(ID,F(C)) H(ID,F(C)) 15

23 3.1 SAS-2 User Data strages : Ni Server Data strages : ID,A Input ID,S A=X(ΙD,S Ni) Generates a rondom number Ni+1 and stores Ni+1 C=X(ΙD,S Ni+1) F(C)=F(ID,C) α=c (F(C)+Α) β=f(c) Α ID,α,β F(C)=β Α C=α (F(C)+Α) True F(C)=F(ID,C)? Authentication fail True A=C γ=η(ιd,f(c)) γ 3.2 SAS False i γ=h(id,f(c))? True Authentication fail 16

24 3.2 SAS-2 SAS-2 (i+1) = E (F (E) + C) = F (E) C ID. = x (F (x) + C) = F (x) C ID i SAS SAS-2 SAS-2 17

25 3.2 SAS Application Web browser Web browser Web Web server web Q web P I ID Web browser Cookie R HTTP X F H H(x) x i N i i SAS-2 ID 18

26 3.2 SAS-2 ID N 1 A=X(N 1 ) 2. Q A Q A 3. Q P 4. IDI I A 5. HTTP R IDI 6. I Cookie I 19

27 3.2 SAS

28 3.2 SAS-2 ID ID 3.4 i 1. N i A=X(N i ) N i+1 C=X(N i+1 ) = C A = (F(C) + A) A 2. IDI 3. A = A C = (F( ) + A) 4. A 5. A C = (A) 6. HTTP R 7. H(F(X(N i ))) Cookie N i N i+1 21

29 3.2 SAS i 22

30 4 4.1 ID Cookie ID ID i +1 = E (F (E) + C) = F (E) C 23

31 4.2 = x (F (x) + C) = F (x) C i LAN ID Cookie Cookie ID Cookie Cookie Cookie ID i Cookie Cookie

32 java java HTTP java API HttpURLConnection HttpURLConnection A POST Cookie PHP POST A 160bit SHA

33 4.2 H/W OS PHP CPU 4.1 centos 64bit php GHz intel Coure 2 Duo 480Mb H/W OS mac osx 10.6 java CPU 4.2 JDK GHz intel Coure 2 Duo 4Gb 26

34 URL SAS API 2 java API currenttimemillis Google Chrome SSL HTTP 2 Google Chrome HTTP ms/ 17.4 SSL ms/ ms/ SAS HTTP ms/ SAS ms/ ms/

35 ID ID Cookie ID SSL ID ID SSL 41.8 ms SAS ms SSL 6 SAS HTTP HTTP HTTP SSL

36 5 SAS ID SSL ID ID Cookie Cookie java Google Chrome fire fox 29

37 30

38 [1] IPA,, [2] IPA, 6,, pp.22-28, [3] T.Tsuji, A.Shimizu, A one-time password authentication method for low spec machines and on internet protocols, IEICE Trans.Commun., vol.e87-b, no.6. pp , [4], Web : HTTP URI HTML REST,, pp.80-87, [5], SAS-2,,, pp.31-34, [6], SAS Web,,, pp.19-33, [7] IETF, HTTP State Management Mechanism, [8],,,,,, pp.31-32, [9],,, www,:, pp.22-24, [10],,,,,

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i 26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

21 VoIP An encrypted VoIP communication system for mobile telephones

21 VoIP An encrypted VoIP communication system for mobile telephones 21 VoIP An encrypted VoIP communication system for mobile telephones 1095702 2010 3 4 VoIP, IP., IP, VoIP(Voice over Internet Protocol)., VoIP,., VoIP over SSL(VoIPs), VoIPs.,,.,, VoIP., LAN VoIP. LAN

More information

第2回_416.ppt

第2回_416.ppt 3 2 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 2-1 2-1-1 (CSRF) 2-1-2 ID 2-1-3 ID 2-1-4 https: 2-1-5 ID 2-1-6 2-1-7 2-2 2-2-1 2-2-2 2-3 2 2-3-1 Web Copyright

More information

CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization to@math.nagoya-u.ac.jp, Powered by A

CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization to@math.nagoya-u.ac.jp, Powered by A Central Authentication System naito@math.nagoya-u.ac.jp to@math.nagoya-u.ac.jp, Powered by Adobe Reader & ipod Photo March 10, 2005 RIMS p. 1/55 CAS Yale Open Source software Authentication Authorization

More information

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

,,.,,., II,,,.,,.,.,,,.,,,.,, II i 12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i 28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

IT i

IT i 27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

2

2 0. 92a --------------------------------------------------------- ---------------------------------------------------- 1. 1-1. 1-2. 1-3. 2. 2-5. 1 2 a ---------------------------------------------------------

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32 CAS Single Sign On naito@math.nagoya-u.ac.jp naito@math.nagoya-u.ac.jp, Aug. 19, 2005 NII p. 1/32 Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS naito@math.nagoya-u.ac.jp, Aug. 19, 2005 NII p.

More information

Windows2000 Edge Components V Edge Components V Java Edge Components

Windows2000 Edge Components V Edge Components V Java Edge Components WebSphere Application Server V5.1 Edge Components V5.1 / CBR Method Ver. 1.0 - Windows 2000 - 1.... 3 2. Windows2000 Edge Components V5.1... 4 2.1.... 4 2.2.... 4 3. Edge Components V5.1... 5 3.1.... 5

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS Single Sign On (Hisashi NAITO) naito@math.nagoya-u.ac.jp Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp, Oct. 19, 2005 Tohoku Univ. p. 1/40 Plan of Talk CAS CAS 2 CAS Single

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 11 2004-2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. FileMaker, Inc. FileMaker FileMaker,

More information

21 A contents organization method for information sharing systems

21 A contents organization method for information sharing systems 21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

FileMaker Server 9 Getting Started Guide

FileMaker Server 9 Getting Started Guide FileMaker Server 10 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento Bento FileMaker, Inc. Mac Mac Apple Inc. FileMaker

More information

評論・社会科学 84号(よこ)(P)/3.金子

評論・社会科学 84号(よこ)(P)/3.金子 1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix

More information

WIDE 1

WIDE 1 WIDE 1 2 Web Web Web Web Web Web Web Web Web Web? Web Web Things to cover Web Web Web Web Caching Proxy 3 Things NOT covered / How to execute Perl Scripts as CGI binaries on Windows NT How to avoid access

More information

i

i 14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7

More information

Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4

Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4 XML Day Web2.0 REST SOAP SOAP REST WADL, WSDL2.0 REST SOAP " " 2006 12 11 XML Web2.0 SOAP REST 2 Web SOAP Internet Web REST SOAP REST 3 REST SOAP 4 REST Representational State Transfer REST Web URL XML

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

shio_20041004.PDF

shio_20041004.PDF JPNIC JPCERT/CC 2004 Web 2004 10 4 Web Web Web WASC Web Application Security Consortium 7 Web Security Threat Classification Web URL 2 ...?? It depends!? It depends!??? 3 ? It depends!...

More information

FileMaker Server 8 Advanced Web Publishing Installation Guide

FileMaker Server 8 Advanced Web Publishing Installation Guide FileMaker Server 8 Advanced! 13 2004-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. ScriptMaker FileMaker, Inc.

More information

, i

, i 23 The reserch of the users action patterns and the suitable delivery of coupons for them 1145120 2012 2 13 , i Abstract The reserch of the users action patterns and the suitable delivery of coupons for

More information

Flash Player ローカル設定マネージャー

Flash Player ローカル設定マネージャー ADOBE FLASH PLAYER http://help.adobe.com/ja_jp/legalnotices/index.html iii................................................................................................................. 1...........................................................................................................

More information

Dec , IS p. 1/60

Dec , IS p. 1/60 Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

11 Windows XP IP WEP (Web )

11 Windows XP IP WEP (Web ) Docodemo-Net (WEP ) cis-supports 25 11 18 1 Docodemo-Net 3 2 Docodemo-Net 3 3 3 4 3 5 4 5.1 LAN........................................ 4 5.2 LAN........................................ 4 6 5 6.1 LAN........................................

More information

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ 6 : JavaScript 2 : Web Web HTTPS : Web : Web, Internet Week 1 / 23 2 / 23 Web Web : HTTP: ( ) TCP: IP: ( ) Web 3 / 23 Basic (base64 ) ( ) Digest md5 Basic (nonce) hidden

More information

19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability

19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 1105402 2008 2 4 2,, i Abstract Systematization of Problem Solving Strategy in High School

More information

ohp.mgp

ohp.mgp 2019/06/11 A/B -- HTML/WWW(World Wide Web -- (TA:, [ 1 ] !!? Web Page http://edu-gw2.math.cst.nihon-u.ac.jp/~kurino VNC Server Address : 10.9.209.159 Password : vnc-2019 (2019/06/04 : : * * / / : (cf.

More information

main.dvi

main.dvi Central Authentication and Authorization Service Web Application (Hisashi NAITO) Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp (Shoji KAJITA) Information Technology Center,

More information

CSV ToDo ToDo

CSV ToDo ToDo intra-mart ver4.0 2003/05/02 1. ( 10 imode ConceptBase imode CSV ToDo ToDo 2. intra-mart ver4.0 Java Sun JDK1.3.1 WebServerConnector Java DDL intra-mart intra-mart Java OS (1 Web Web intra-mart 2 Sun ONE

More information

untitled

untitled 200 7 19 JPCERT [2007 2 4 6 ] IPA JPCERT JPCERT/CC 2007 2 4 6 1 2 1. 2007 2 1 2007 4 1 6 30 IPA 46 95 141 2004 7 8 501 940 1,441 3 2 (1) 3 2004 7 8 1 2007 2 1.98 1 2005/1Q 2005/2Q 2005/3Q 2005/4Q 2006/1Q

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i 20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization

More information

23 The Study of support narrowing down goods on electronic commerce sites

23 The Study of support narrowing down goods on electronic commerce sites 23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

事例に見るSCORMの・・・

事例に見るSCORMの・・・ SCORM 1.2 2005 8 2004, 2005 i 2004 6 1.0 2004 6 1.02 3.1.1 2005 1 1.1 2.1.4, 2.4.9, 2.5.2, 2.5.3, 3.1.3, 3.4.6, 3.5.2, 3.5.3. 2005 8 1.2 2.1.1 BOM 2.2.2, 2.4.10, 3.1.1 BOM 3.2.2, 3.4.7. ii 1. 1 2. 2 2.1

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

finalrep.dvi

finalrep.dvi 18 Building a Knowledge Management System for Acquiring Wisdom of Crowds 1095701 2007 3 16 Blog Wiki Web Web Web i Abstract Building a Knowledge Management System for Acquiring Wisdom of Crowds Kazunori

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

konicaminolta.co.jp PageScope Net Care

konicaminolta.co.jp PageScope Net Care konicaminolta.co.jp PageScope Net Care KONICA MINOLTA PageScope Net Care KONICA MINOLTA PageScope Net Care Web KONICA MINOLTA PageScope Net Care SNMP KONICA MINOLTA Printer-MIB KONICA MINOLTA PageScope

More information

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video

More information

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o 78 2 78... 2 22201011... 4... 9... 7... 29 1 1214 2 7 1 8 2 2 3 1 2 1o 2o 3o 3 1. I 1124 4o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o 72 1. I 2o 3o 4o 5o 6o 7o 2197/6 9. 9 8o 1o 1 1o 2o / 3o 4o 5o 6o

More information

IT 1. IT 2. 2.1. IT 2.2. SKYSEA Client View Government License Light Edition Sky 1500 28 2 15 12 3. 4. 28 3 25 1 5. 5.1. (1) 28 4 1 (2) (3) (4) ISO27001 P (5) ISO/IEC20000 (6) USB 1 (7) OS (8) 1 CPU 4

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,

More information

WEBサービス超入門 mask.key

WEBサービス超入門 mask.key WEB WEB 2 3 4 6 7 8 10 11 12 13 15 16 IT UX UI Logic UI Logic DB WEBAPI IT UX UI UI Logic UI Logic API DB DB WEBAPI xunit OS IT JavaScript UI Logic UI Logic Objective-C Swift HTML PHP Ruby Python JavaScript

More information

i ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

NetIQ White Paper

NetIQ White Paper Contents Contents... 1 APPMANAGER 4.3J... 1 1... 1 2.... 2 2.1...2 2.1.1...2 2.1.2...3 2.1.3...6 2.2...7 2.2.1...7 2.3...9 Appendix... 13 AppManager 2GB...13 MDAC...14 AppManager 4.3J 1.1 March 19, 2003

More information

provider_020524_2.PDF

provider_020524_2.PDF 1 1 1 2 2 3 (1) 3 (2) 4 (3) 6 7 7 (1) 8 (2) 21 26 27 27 27 28 31 32 32 36 1 1 2 2 (1) 3 3 4 45 (2) 6 7 5 (3) 6 7 8 (1) ii iii iv 8 * 9 10 11 9 12 10 13 14 15 11 16 17 12 13 18 19 20 (2) 14 21 22 23 24

More information

第3回_416.ppt

第3回_416.ppt 3 3 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 3-1 3-1-1 SQL #1 3-1-2 SQL #2 3-1-3 3-1-4 3-2 3-2-1 #2 3-2-2 #1 3-2-3 HTTP 3-3 3-3-1 3-3-2 Copyright 2010

More information

23 Study on Generation of Sudoku Problems with Fewer Clues

23 Study on Generation of Sudoku Problems with Fewer Clues 23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil

More information

262014 3 1 1 6 3 2 198810 2/ 198810 2 1 3 4 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1... 1... 2... 2... 4... 5... 9... 9... 10... 10... 10... 10... 13 2... 13 3... 15... 15... 15... 16 4...

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

21 e-learning Development of Real-time Learner Detection System for e-learning

21 e-learning Development of Real-time Learner Detection System for e-learning 21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning

More information

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

2007-Kanai-paper.dvi

2007-Kanai-paper.dvi 19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array

More information

XMLアクセス機能説明書

XMLアクセス機能説明書 SolarisTM Solaris Microsoft Windows NT Server network operating system Version 4.0 Windows NT Microsoft Windows 2000 Server operating systemmicrosoft Windows 2000 Advanced Server operating system Windows

More information

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2) (1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46

More information

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21

178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 I 178 II 180 III ( ) 181 IV 183 V 185 VI 186 178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 4 10 (

More information

25 Removal of the fricative sounds that occur in the electronic stethoscope

25 Removal of the fricative sounds that occur in the electronic stethoscope 25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope

More information

i ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii

More information

1 JIS X 8341-3:2016 WCAG2.0 http://waic.jp/docs/wcag2/understanding.html WCAG2.0 http://waic.jp/docs/wcag2/techs.html 2 ... 1... 3... 6 1.1... 6 1.2... 7... 8 1.1.1... 8 1.2.1... 13 1.2.2... 14 1.2.3...

More information

FileMaker Server Getting Started Guide

FileMaker Server Getting Started Guide FileMaker Server 12 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. Bento FileMaker, Inc. FileMaker

More information

Docodemo-Net (Q&A ) Web Web (http://www.cis.twcu.ac.jp/cis/) 1.1 WPA2 (WEP ) LAN WEP WPA2 WPA2 Docodemo-Net WEP 2 Docodemo-Net ( @cis.twcu.ac.jp) lab

Docodemo-Net (Q&A ) Web Web (http://www.cis.twcu.ac.jp/cis/) 1.1 WPA2 (WEP ) LAN WEP WPA2 WPA2 Docodemo-Net WEP 2 Docodemo-Net ( @cis.twcu.ac.jp) lab Docodemo-Net (Windows8 WPA2 ) cis-supports 2013 10 10 1 Docodemo-Net 1 1.1 WPA2 (WEP ).................................. 2 2 Docodemo-Net 2 3 2 4 2 5 3 5.1 LAN........................................ 3

More information

Microsoft PowerPoint - 情報システム20131127.pptx

Microsoft PowerPoint - 情報システム20131127.pptx 2013 11 27 NTT ISP IP 32 8. FTTH OLT ONU( ) ADSL DSLAM ADSL (ISDN) WiMAX ISP i sp ISP LAN ISP IP PPPoE FTTH ADSL BAS ID IP PPP RAS ID IP DHCP DHCP IP PPPoE ID ID ISP @ IP IPCP ID PC PC WAN LAN PC PPPoE

More information

intra-mart Web for SellSide ver /03/31 Oracle MS-SQL Server IBM DB2 MS-SQL Server IBM DB2 Client Side JavaScript Server Side JavaScript URL -

intra-mart Web for SellSide ver /03/31 Oracle MS-SQL Server IBM DB2 MS-SQL Server IBM DB2 Client Side JavaScript Server Side JavaScript URL - intra-mart Web for SellSide ver3.1.0 2002/03/31 Oracle MS-SQL Server IBM DB2 MS-SQL Server IBM DB2 Client Side JavaScript Server Side JavaScript URL - intra-mart intra-mart intra-mart - 1 - intra-mart

More information

template.dvi

template.dvi XVI W I D E P R O J E C T 16 1 igeoid Internet GEOgraphical Information Platform Development ULP 2 2.1 PDA GPS Global Positioning System IC RFID ID LAN 2.1.1 GPS LAN IC 2.1 2.2 2.2.1 163 16 16 16 W I

More information

SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i

SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i 28 SQL Proposal of attack detection method based on appearance frequency of symbols included in SQL injection attack and its relevance 1170311 2017 2 28 SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL

More information

API SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning SCORM SCORM SCO LMS SCORM SCORM HTML XML JavaScript SCO

API SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning SCORM SCORM SCO LMS SCORM SCORM HTML XML JavaScript SCO 18 API SCORM Development of SCORM Making Support System focus on using Data Model and API Instance 1070419 2007 3 9 API SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning

More information