Challenge PKI 2002 IETF PKI

Size: px
Start display at page:

Download "Challenge PKI 2002 IETF PKI"

Transcription

1 Challenge PKI 2002 IETF PKI

2 Agenda IETF? IETF PKI JNSAIETF Copyright (c) 2003 NPO Page 2

3 IETF? RFC 8 WG Applications, General, Internet, Operations and Management, Routing, Security, Sub-IP, Transport8 3 (2 1 ) 7 (Vienna) Copyright (c) 2003 NPO Page 3

4 IETF ( 2) Copyright (c) 2003 NPO Page 4

5 IETF IPv6 / / IP IP (SIP) IPsec/SSH/PKI Copyright (c) 2003 NPO Page 5

6 IETF Internet / Internet-Drafts IESG IT Copyright (c) 2003 NPO Page 6

7 56 th IETF San Francisco Hilton ( ) Copyright (c) 2003 NPO Page 7

8 IETF PKI Security Area PKIX-WG Security Area S/MIME TLS IP Area IPsec Operation AAA IETF PKI Copyright (c) 2003 NPO Page 8

9 IETF PKI S/MIME, TLS, IPsec, SIP, Diameter S/MIME, TLS, IPsec, SIP, Diameter S/MIME, IPsec, SIP, Diameter / PKIX PKI BOF/WG? Copyright (c) 2003 NPO Page 9

10 PKIX-WG RFC 337: DPD(Delegated Path Discovery)/DPV(Delegated Path Verification) EE 56 th IETF PKIX-WGSCVP Proxy Certificate / Qualified Certificate? PKI TAP OASIS/W3C/EESSI/JNSA Copyright (c) 2003 NPO Page 10

11 JNSAIETF PKIX-WGChallenge PKI 2001 PKIX-WGChallenge PKI 2002 Francisco PKIX-WGChallenge PKI 2002 Copyright (c) 2003 NPO Page 11

12 56 th IETF Security Area Director MITJeffrey I. Schiller Russell Housley Virgil Security RSA Laboratories. RFC2459/3280 S/MIME WG Copyright (c) 2003 NPO Page 12

13 56 th IETF PKIX-WG : 76 Chairs: Stephen Kent(BBN), Tim Polk(NIST) 19 Internet-Drafts(I-Ds) Last Call SCVP, Proxy Cert Expire Draft Area Director Repository Locator Service Copyright (c) 2003 NPO Page 13

14 Copyright (c) 2003 NPO Page 14

15 Agenda DPD/DPV standard selection process SCVP Discussion Proxy Certificates Signature Algorithms & Key Usage Trusted Archive Protocol Qualified Certificates Profile LDAP/X.500 alignment Subject Identification Method EESSI JNSA ChallengePKI 2002 LDAP PKI Issues Liaison Copyright (c) 2003 NPO Page 15

16 DPV/DPD Strawpoll Tim Polk(NIST) RFC3379 SCVP, CVP, DVCS, OCSPv2 Matrix Matrix ML Matrix PKIXML SCVP RFC3379 Copyright (c) 2003 NPO Page 16

17 SCVP - Trevor Freemen (Microsoft) 5 57 LastCall MAC RFC3379? ValidationPolicy S/MIME, IPsec, TLS Copyright (c) 2003 NPO Page 17

18 Proxy Cert - Von Welch (Argonne Labs) EE ( )EE issueree ProxyCertificate critical ProxyCert ProxyCert WGLast Call Copyright (c) 2003 NPO Page 18

19 Copyright (c) 2003 NPO Page 19

20 Signature Algorithms & Key Usage Jim Schaad (Soaring Hawk Consulting) PKCS#1PSS/OAEPDH/DSA keyusage algorythmid Russ, Steve Kent, Tim Copyright (c) 2003 NPO Page 20

21 Copyright (c) 2003 NPO Page 21

22 Trusted Archive Protocol Carl Wallace (Cygnacom) ( ) Data Validation: Evidence verification Path Processing: Evidence Collection TSP message CMS DVCS? WG Draft MLTAP DVCS Peter Sylvester PKIXEXT PKIXAPPS WG Copyright (c) 2003 NPO Page 22

23 Copyright (c) 2003 NPO Page 23

24 QC Profile - Stefan Santesson (RetroSpekt) Scope For identify certs issued to physical persons # Legal Regurations? DN issuer RFC3280 keyusage nonrepudiation Copyright (c) 2003 NPO Page 24

25 Copyright (c) 2003 NPO Page 25

26 LDAP/X.500 alignment Skip Slone (Lockheed-Martin) X th 2005 ;binary enhanced Matching nonrepudiation contentcommitment Copyright (c) 2003 NPO Page 26

27 Subject Identification Method - Park Jong-Wook (KISA) non-public peronsl ID sensitive ID: national Id protection ID: national Id 3 revise Copyright (c) 2003 NPO Page 27

28 Copyright (c) 2003 NPO Page 28

29 EESSI Riccardo Genghini European Electronic Signature Standardization Initiative EU 57 th Vienna PKIX/EESSI Copyright (c) 2003 NPO Page 29

30 Copyright (c) 2003 NPO Page 30

31 JNSA ChallengePKI2002 JNSA Challenge PKI 2002 Copyright (c) 2003 NPO Page 31

32 Copyright (c) 2003 NPO Page 32

33 Copyright (c) 2003 NPO Page 33

34 LDAP PKI Issues David Chadwick (Univ of Salford) subjectdn CRL component matching Attribute Extraction CA/RA LDAP LDAP ComponentMatching Copyright (c) 2003 NPO Page 34

35 Copyright (c) 2003 NPO Page 35

36 Copyright (c) 2003 NPO Page 36

37 Copyright (c) 2003 NPO Page 37

38 Multi Domain PKI Test Suite -- Result of JNSA Challenge PKI Ryu Inada As representative of NPO Japan Network Security Association Sponsored by IT Promotion Agency, Japan

39 JNSA Challenge PKI 2002 As we reported on 11-Nov-2002/56 th IETF, we, JNSA, make a Multi Domain PKI Test Suite. We finished work at 28-Feb-2003, and prepare to open it public and translation to English. Estimated date of open to public: End of June 2003 Estimated date of translation to English : End of June Mar th IETF PKIX-WG 2

40 20-Mar th IETF PKIX-WG 3

41 PKI interoperability test suite 20-Mar th IETF PKIX-WG 4

42 Challenge PKI Test Cases 20-Mar th IETF PKIX-WG 5

43 Sample implementations In Java Worked on JDK 1.4 Based on Path Discovery/Path Validation API which provided from reference implementation. And additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. In C++ Worked on Microsoft Crypto API. Using Windows original Revocation Service Provider and additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. 20-Mar th IETF PKIX-WG 6

44 Requirement of GPKI and implementations Requirement Impl. of GPKI *1 CRL IDP ( issuing distribution point ) 20-Mar th IETF PKIX-WG 7

45 Sample implementation for 20-Mar th IETF PKIX-WG 8

46 Sample implementation for JAVA GPKICertPathBuilderSpi GPKICertPathChecker GPKICertPathValidatorSpi java.security.cert.* We extend original JDK s path builder/path checker interface. 20-Mar th IETF PKIX-WG 9

47 To achieve more Applicable Test Suite... Provide Framework more applicable & reusable Easy to extract minimal test case There are too many test cases about 256 cases. For easily modified to you purpose: PKIX, GPKI, and other frameworks Ready for Multi-domain PKI Re-usable for others No depend on environment Run on your local environment maybe linux or cygwin? We need two Reference!! Define multi-domain PKI PKI Define DB DB Schema to to re-use 20-Mar th IETF PKIX-WG 10

48 Related Links NPO JNSA IPA Security Center JNSA Challenge PKI Implementation Problems on PKI ( JNSA Challenge PKI 2001 ) nge2001.html The report of Challenge PKI in IETF Atlanta 20-Mar th IETF PKIX-WG 11

49 Demonstration 20-Mar th IETF PKIX-WG 12

untitled

untitled better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge

More information

第3 章 電子認証技術に関する国際動向

第3 章 電子認証技術に関する国際動向 3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.

More information

untitled

untitled PKI 1 / SSL/TLS PKI 28 Oct 2005 PKI /JNSA PKI Day 3 PKI? 2 RFC 2459/RFC 3280/RFC 3280bis CRL(RFC 2459/RFC 3280/RFC 3280bis) OCSP(RFC 2560/Light-weight OCSP) SCVP(SCVP) CMP(RFC 2510/RFC 4210) CRMF(RFC 2511/RFC

More information

<4D F736F F F696E74202D B F8089BB82CC88EA91A496CA C982A882AF82E9504B4982CC8FF38BB52E707074>

<4D F736F F F696E74202D B F8089BB82CC88EA91A496CA C982A882AF82E9504B4982CC8FF38BB52E707074> 標準化の一側面 -- IETF における PKI の状況 -- 富士ゼロックス株式会社システム要素技術研究所稲田龍 概要 RFC 5280 (RFC 3280 の後継 ) が 2008 年 5 月に公開 PKI のインターネットでの利用のプロファイルが更新 PKI のインフラストラクチャとしての利用には決着がついたのか? 新たな暗号 ハッシュアルゴリズムの利用は?

More information

はじめに

はじめに 19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30

More information

Katsuhito Asano Fujitsu LTD /Apr/2002 1

Katsuhito Asano Fujitsu LTD /Apr/2002 1 Katsuhito Asano Fujitsu LTD. 2002 24/Apr/2002 1 Sub-IP Area WG WG Sub-IP WG PWE3(Transport Area) L2TPEXT 2 Sub-IP Area Sub-IP Area MPLS 3 Sub-IP Area Sub-IP IP(Layer3) Media(Layer2) Layer2.5 Area The work

More information

PKIの標準化動向と リソースPKI

PKIの標準化動向と リソースPKI PKI Day 2009 2009 6 24 PKI PKI JPNIC RFC5280 PKI RFC5280 PKI RPKI IP RPKI RFC5280 RFC5280 RFC3280 PKI RFC5280 RFC5280 1/4 RFC5280 X.509-based PKI X.509CRL 2008 5published RFC5280 2/4 1988 1995 1997 1999

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

XMLを基盤とするビジネスプロトコルの動向

XMLを基盤とするビジネスプロトコルの動向 XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

untitled

untitled WEB SAML 2.0 RSA 2005 SAML 2.0 2 1 3 Federated Identity The agreements, standards, and technologies that make identity and entitlements portable across autonomous domains. The Burton Group Web 4 2 Scope

More information

untitled

untitled 1 2 1 3 IR... 4 2 5 1990 Surety 1990 2000 IETFISO/IEC 6 3 7 ISO/IEC 18014 IETF RFC 3161 Time-stamp Protocol ETSI TS 102 023RFC 3628) ETSI TS 101 861 8 4 (TSA, Time Stamping Authority) 1ab5c98f... 1ab5c98f...

More information

電子メールのセキュリティ

電子メールのセキュリティ S/MIME 1...1 1.1... 1 1.2... 2 1.3... 2 2...3 2.1... 3 2.2... 4 2.3... 4 3...5 3.1... 5 3.2... 6 3.3... 8 3.4... 10 4...12 4.1 PGP... 12 4.2 (CA)... 13 5 CRL...15 5.1 ( ID )... 15 5.2 CRL(Certificate Revocation

More information

sp c-final

sp c-final NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

untitled

untitled PKI UTF8String Part4: IETF MicrosoftMSWindowsWindows 2000Windows NTWindows XPWindows Internet ExplorerOutlookOutlook Express Microsoft Corporation Sun MicrosystemsSun Java Solaris JavaJDK Sun Microsystems

More information

, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei

, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei , Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP

More information

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved. Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise

More information

IC API

IC API IC API Handa-F@mail.dnp.co.jp 2004 8 26 Copyright (c) 2004 NPO Page 2 IC API PKI IC PKCS#11 CSP (Cryptographic Service Provider) PKCS#11 CSP PKCS#15 GSC-IS Copyright (c) 2004 NPO Page 3 (identity token)

More information

T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Intro

T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Intro T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Introduction (DTR/TIPHON-01004-1 V0.1.5) 1.0 2001 8 30 THE

More information

untitled

untitled 25: Part ( ) Chief Technology Officer mshindo@fivefront.com SNMP MRTG HP/OV RMON INTERNET WEEK 2006/12/08 Copyright 2006 Fivefront Corporation, All Rights Reserved. 2 1 SNMP IfInUcastPkts, IfOutUcastPkts

More information

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v

More information

Microsoft PowerPoint - T9-inada-IW2002.ppt

Microsoft PowerPoint - T9-inada-IW2002.ppt IW2002 PKI 応用編 富士ゼロックス株式会社稲田龍 PKI アプリケーション 1 アプリケーションの動向 HTTPS S/MIME 電子署名アプリケーション HTTPS SSL を使い通信路の暗号化と接続先 ( 元 ) の認証を行う Internet Explorer/Netscape Navigator などが標準でサポート 多くの場合

More information

JP1/Integrated Management - Service Support 操作ガイド

JP1/Integrated Management - Service Support 操作ガイド JP1 Version 9 JP1/Integrated Management - Service Support 3020-3-R92-10 P-242C-8F94 JP1/Integrated Management - Service Support 09-50 OS Windows Server 2008 Windows Server 2003 OS JP1/Integrated Management

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

★保健医療科学_第67巻第2号.indb

★保健医療科学_第67巻第2号.indb Vol. No.p. Evidence Based Public Health: ICT/AI Issues of the internet environment in local governments Norihiko Ito 1), Hiroshi Mizushima 2) ) Hokkaido Mombetsu Health Center (Concurrently) Hokkaido Mombetsu

More information

189 2015 1 80

189 2015 1 80 189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87

More information

楕円曲線暗号の整備動向 +楕円暗号の実装状況

楕円曲線暗号の整備動向  +楕円暗号の実装状況 楕円曲線暗号の整備動向 + 楕円暗号の実装状況 2011 年 2 23 筑波 学 岡晃 2011/2/23 JNSA PKI 相互運用 WG 1 IPA 情報セキュリティ技術動向調査 TG ( タスク グループ ) 広範な情報セキュリティ分野において 継続的に かつ 質の い技術情報を収集し続けるため 半期毎に発表会形式の会合を開催し 討議をふまえて調査報告書を作成します http://www.ipa.go.jp/security/outline/comm

More information

幅広い業種や業務に適応可能なRFIDソリューション

幅広い業種や業務に適応可能なRFIDソリューション RFID RFID Solution Applicable to Various Types of Business 吉 田 正 橋 本 繁 落 合 孝 直 あらまし UHF RFID Radio Frequency IDentification UHF RFID RFID UHF RFID Abstract UHF-band Radio Frequency IDentification (RFID)

More information

untitled

untitled UPKI JNSA PKI Day 2008 PKI 200873 Sapporo Sendai Osaka Kyoto Nagoya Tokyo Fukuoka (NII) 2008/7/3 PKI Day 2008 2 3 UPKI (Cyber Science Infrastructure) PKI 2008/7/3 PKI Day 2008 4 UPKI 16 7 NII 17 7KEKNII

More information

untitled

untitled DCMI nagamori@slis.tsukuba.ac.jp DCMI Metadata Schema Registry DCMI Dublin Core Metadata Initiative authoritative source 2004/10/29 2 1 Metadata is the information and documentation which makes data understandable

More information

GPGPU

GPGPU GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

ENUM

ENUM ENUM Internet Week DNS Day fujiwara@jprs.co.jp ENUM ENUM IETF ENUM WG Status ITU ENUM DNS ENUM 050 ENUM e164.arpa DNS ITU International Telecommunication Union ITU-T ITU Telecommunication Standardization

More information

マイナンバーカードによる認証と署名

マイナンバーカードによる認証と署名 Open Source Solution Technology Corporation HAMANO Tsukasa JNSA 電子署名 WG 秋祭り 君の署名は 目次 マイナンバーカードによる認証と署名 個人番号カードの中身 IC カードによる認証とデジタル署名 ユーザー認証 SSH 認証 /macos ログイン / ブラウザ デジタル署名 CMS 署名

More information

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

- Principles for a Telecommunications management network 2.0 2001 11 27 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 2 JT-M3010 ...19...20...20...20...20...21...22...23...24 3 JT-M3010 ...26...28...29...34...34...35...35...37...37...37...37...37

More information

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

XJTAG

XJTAG LDRA/ T-VEC/ MetaEdit+ Domain Specific Modeling Ashling/Jtag ARC SmartCards LAUTERBACH /Jtag ARM PowerPC K MIPS XJTAG HW Domain-Specific Modeling Domain-Specific Modeling Software Technology 30 Copyright

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

大学における原価計算教育の現状と課題

大学における原価計算教育の現状と課題 1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012

More information

LC304_manual.ai

LC304_manual.ai Stick Type Electronic Calculator English INDEX Stick Type Electronic Calculator Instruction manual INDEX Disposal of Old Electrical & Electronic Equipment (Applicable in the European Union

More information

untitled

untitled Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network

More information

JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna

JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alternative approach using the Monte Carlo simulation to evaluate

More information

Juniper Networks Corporate PowerPoint Template

Juniper Networks Corporate PowerPoint Template Juniper SRX 日本語マニュアル 41. SSL Forward Proxy の CLI 設定 はじめに SRX340 における SSL Forward Proxy の CLI 設定ついて説明します 手順内容は SRX340 JUNOS 15.1X49-D140 にて確認を実施しております SSL Proxy 機能については SRX340 以上の機種にてサポートされています 2018 年 8

More information

署名ツール検証報告書

署名ツール検証報告書 2010 01 27 XML 1.... 3 2.... 5 3.... 15 4.... 18 5.... 22 6.... 22 Copyright (c) XML 2010 All rights reserved. Page-1/23 Copyright (c) XML 2010 All rights reserved. Copyright (c) XML 2010 All rights reserved.

More information

untitled

untitled IC IC IC VJC IC 14 IC IC IC IC IC 2006 6 IC VJC IC 14 IC IC IC 1 IC IC 1 IC IC IC KANSAI 2 IC IC IC IC IC IC IC IC PiTaPa 1 IC IC IC 5 1 2 VISA VISA IC IC IC A A VISA A IC B VISA IC IC 3 IC IC IC IC IC

More information

JR4 JR 3 JR4 KUSUKI, Yukio JR 4 JR JR JR JR JR JR JR , ,530/90 17/ JR

JR4 JR 3 JR4 KUSUKI, Yukio JR 4 JR JR JR JR JR JR JR , ,530/90 17/ JR JR4JR 3 JR4 KUSUKI, Yukio 1 1.1 2011JR4 JR JRJR JRJR4 20 5 JR41 2011 JR 82299 1,129101 307106 263109 4492 1,530/90 17/50 2 2020 JR 281106 375103 9494 88117 624 517/35 1/25 0 2020 3 JR 1,907101 1,864101

More information

untitled

untitled Japan College of Social Work 01 Japan College of Social Work Profile Contents Japan College of Social Work 02 01 Case 02 Case 03 Case 04 Case 05 Case 03 Japan College of Social Work Japan College of Social

More information

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 MAP Tutorial @ 1 Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 IPv4 over IPv6 IPv6 network IPv4 service Internet Service ProviderISP IPv4 service

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada Social Influences and Legal Issues of Google Street View Hiroshi Takada Sanno University Bulletin Vol. No. September Social Influences and Legal Issues of Google Street View Hiroshi Takada In this paper,

More information

IPv6 IPv IETF IPv6 2

IPv6 IPv IETF IPv6 2 IPv6 IPv6 2003 2 3 1 IETF IPv6 2 2001, 2002 RIR IPv6 IETF IPv6 3 IETF (1/2) IETF (Internet Engineering Task Force) IPv6 WG 2001 IPng (IP Next Generation) WG IPv6 WG IPng Home Page: http://playground.sun.com/ipng

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

untitled

untitled Interfaculty Initiative in Information Studies, The University of Tokyo 2 Interfaculty Initiative in Information Studies, The University of Tokyo > > 517587 82 > > > > > 3 Interfaculty Initiative in Information

More information

Microsoft Intune MDM ソリューション向けDigiCert® 統合ガイド

Microsoft Intune MDM ソリューション向けDigiCert® 統合ガイド Microsoft Intune MDM DigiCert 2018 7 31 Microsoft Intune MDM DigiCert : 2018 7 31 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

Microsoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)

Microsoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内) (2017.04 29 36 234 9 1 1. (1) 3 (2) 9 1 2 2. (1) 9 1 1 2 1 2 (2) 1 2 ( PSE-RE-101/205/306/405 2 PSE-RE-201 PSE-RE-301 PSE-RE-401 PSE-RE-302 PSE-RE-202 PSE-RE-303 PSE-RE-402 PSE-RE-203 PSE-RE-304 PSE-RE-403

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa

More information

Encryption Security

Encryption Security 200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML

More information

untitled

untitled Vista PKI PKI IE7IE7 Kiyoshi Watanabe, CISSP Security Center of Excellence (SCOE) Microsoft Vista Windows 2008 Vista, IE7, PKI Enrollment Credential CNG Bit Locker NAP IE7 Vista 6 http://www.csoonline.com/pdf/6_month_vista_vuln_report.pdf

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

SUMMARY There might be no other business that has high uncertainty like Live Entertainment Business. This is because the success and failure of this business depend a great deal on the unscientific element

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

インターネットレジストリにおける レジストリデータの保護と応用

インターネットレジストリにおける レジストリデータの保護と応用 JPOPM15 2008 年 11 月 27 日秋葉原コンベンションホール RIR/JPNIC における電子認証技術と インターネット経路制御のセキュリティ向上に関する動向 木村泰司 内容 RIR/JPNIC における電子認証技術 インターネット経路制御のセキュリティ向上に向けた取り組み JPNIC における取り組み Copyright 2008 Japan Network Information

More information

rzat10pdf.ps

rzat10pdf.ps IBM i 7.2 IBM Navigator for i IBM IBM i 7.2 IBM Navigator for i IBM 9 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Connecting to your system Connecting to IBM Navigator for i Copyright IBM Corporation

More information

RPKIとインターネットルーティングセキュリティ

RPKIとインターネットルーティングセキュリティ RPKI とインターネット ルーティングセキュリティ ~ ルーティングセキュリティの未来 ~ セキュリティ事業担当 木村泰司 内容 1. リソース証明書と RPKI 2. 国際的な動きと標準化動向 3. ディスカッションのポイント 2 1 リソース証明書と RPKI リソース証明書とは ~ アドレス資源の 正しさ ~ イ ) これは正しいアドレスだ whois $ whois h whois.nic.ad.jp

More information

untitled

untitled ISO 26262 : 2011(E) Functional safety nal 2 Managem ment of functio safety 3 Con ncept phase Annex B Examples for evaluating a safety culture Annex C (informative) Aim of the confirmation measures 8 Functional

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

証明書検証サーバ

証明書検証サーバ (Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)

More information

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

2011 NTT Information Sharing Platform Laboratories

2011 NTT Information Sharing Platform Laboratories NGN IPv6 multi-homing uplink load balancing 2 3 4 uplink uplink prefix domain A domain A prefix prefix prefix = longest match domain A domain A DNS Server domain A domain B 5 uplink uplink prefix domain

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

2002 8 2

2002 8 2 2002 8 2 1....1 1.1.... 1 1.2. PKI IPsec... 1 2....2 2.1. VPN... 2 2.2.... 3 3....4 3.1. VPN PKI... 4 3.2.... 5 3.3. IPsec... 6 4....7 4.1. VPN PKI... 7 4.2.... 7 4.3. IPsec...11 5.... 21 5.1.... 21 5.2....

More information

Trial Study to Aggregate the Flow of Relief Funds for the Great East Japan Earthquake: Matrix of Relief Fund Inflow and Outflow Abstract The 2011 Grea

Trial Study to Aggregate the Flow of Relief Funds for the Great East Japan Earthquake: Matrix of Relief Fund Inflow and Outflow Abstract The 2011 Grea 東日本大震災における援助資金フロー捕捉の試み Title インフローとアウトフローに関する援助資金マトリッ クス Author(s) 中嶋, 貴子, 馬場, 英朗 Citation 計画行政, 38(4): 39-49 Issue Date 2015-11 URL http://hdl.handle.net/10112/10206 Rights Type Journal Article Textversion

More information

資料1-3

資料1-3 WPT (2017) ( ) *JST Center of Innovation ( 13- ) Last 5X * 16 8, 15 7, 14 6 METLAB 16 20, 15 18 WPT * IEEE MTTS Wireless Power Transfer Conference ( 11-, ) MTTS TC-26 (Wireless Energy Transfer and Conversion

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

2

2 2 3 ( 4 1) ( 49 8) ( 49 82) ( 49 822) ( 49 823) ( 49 14) ( 49 14) ( 49 14) 49 14 ( 49 17) ( 49 202) IEEE802.11 ( 49 201) IEEE802.11 Bluetooth 5GHz ( 49 203) IEEE802.11 ( 49 204) 5GHz ( 49 21) IEEE802.11

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /, , 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +

2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /, , 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. + 1 BSE *,**+ 3 BSE,**- +23,2 + +,3 3+,**, * 2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /,341 24-14+ 24- +-4, 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +/4../42,240

More information

wide97.dvi

wide97.dvi 11 321 1 CA (Certication Authority) ( ) 1 3 CA S/MIME[104][105][106] SSL[107](Secure Sockets Layer), TLS[108](Transport Layer Security) WWW Netscape Microsoft Web SSL CA CA CA CA CA CA CA members only

More information

JPGRID-GGF0205 第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track

JPGRID-GGF0205 第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track 第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track 3: Developing & Administrating Globus Toolkit 2.2 8 Workshop 1: Grid

More information

3. /dev/urandom 1024 ~CA0/private/cakey.pem $ openssl genrsa -rand /dev/urandom -out \ private/cakey.pem 1024 Generating RSA private key

3. /dev/urandom 1024 ~CA0/private/cakey.pem $ openssl genrsa -rand /dev/urandom -out \ private/cakey.pem 1024 Generating RSA private key PKI : OpenSSL CA NISOC @ 2007/01/06 1 CA:Certificate Authority OpenSSL CA CA0 CA0 2 CA CA1 CA2 3 CA CA1 CA2 PC CA CA 2 CA CA0 1. CA ~CA0 openssl.cnf [ CA default ] dir ~CA0 [ req distinguished name ] CSR

More information

Oracle Identity Managementの概要およびアーキテクチャ

Oracle Identity Managementの概要およびアーキテクチャ Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application

More information

RTM RTM Risk terrain terrain RTM RTM 48

RTM RTM Risk terrain terrain RTM RTM 48 Risk Terrain Model I Risk Terrain Model RTM,,, 47 RTM RTM Risk terrain terrain RTM RTM 48 II, RTM CSV,,, RTM Caplan and Kennedy RTM Risk Terrain Modeling Diagnostics RTMDx RTMDx RTMDx III 49 - SNS 50 0

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

橡C12電子メール最新技術動向revisd.PDF

橡C12電子メール最新技術動向revisd.PDF Internet Week 99 Internet Week 99 1999 Naoaki Watanabe,Japan Network Information Center 1... 1 2... 1 3... 2 4... 5 5... 7 6 IMAP4... 10 7 S/MIME PGP... 14 8... 18 9... 19 IMAP4 Happy99 OutLook Exchange

More information