Challenge PKI 2002 IETF PKI
|
|
- みそら しんまつ
- 5 years ago
- Views:
Transcription
1 Challenge PKI 2002 IETF PKI
2 Agenda IETF? IETF PKI JNSAIETF Copyright (c) 2003 NPO Page 2
3 IETF? RFC 8 WG Applications, General, Internet, Operations and Management, Routing, Security, Sub-IP, Transport8 3 (2 1 ) 7 (Vienna) Copyright (c) 2003 NPO Page 3
4 IETF ( 2) Copyright (c) 2003 NPO Page 4
5 IETF IPv6 / / IP IP (SIP) IPsec/SSH/PKI Copyright (c) 2003 NPO Page 5
6 IETF Internet / Internet-Drafts IESG IT Copyright (c) 2003 NPO Page 6
7 56 th IETF San Francisco Hilton ( ) Copyright (c) 2003 NPO Page 7
8 IETF PKI Security Area PKIX-WG Security Area S/MIME TLS IP Area IPsec Operation AAA IETF PKI Copyright (c) 2003 NPO Page 8
9 IETF PKI S/MIME, TLS, IPsec, SIP, Diameter S/MIME, TLS, IPsec, SIP, Diameter S/MIME, IPsec, SIP, Diameter / PKIX PKI BOF/WG? Copyright (c) 2003 NPO Page 9
10 PKIX-WG RFC 337: DPD(Delegated Path Discovery)/DPV(Delegated Path Verification) EE 56 th IETF PKIX-WGSCVP Proxy Certificate / Qualified Certificate? PKI TAP OASIS/W3C/EESSI/JNSA Copyright (c) 2003 NPO Page 10
11 JNSAIETF PKIX-WGChallenge PKI 2001 PKIX-WGChallenge PKI 2002 Francisco PKIX-WGChallenge PKI 2002 Copyright (c) 2003 NPO Page 11
12 56 th IETF Security Area Director MITJeffrey I. Schiller Russell Housley Virgil Security RSA Laboratories. RFC2459/3280 S/MIME WG Copyright (c) 2003 NPO Page 12
13 56 th IETF PKIX-WG : 76 Chairs: Stephen Kent(BBN), Tim Polk(NIST) 19 Internet-Drafts(I-Ds) Last Call SCVP, Proxy Cert Expire Draft Area Director Repository Locator Service Copyright (c) 2003 NPO Page 13
14 Copyright (c) 2003 NPO Page 14
15 Agenda DPD/DPV standard selection process SCVP Discussion Proxy Certificates Signature Algorithms & Key Usage Trusted Archive Protocol Qualified Certificates Profile LDAP/X.500 alignment Subject Identification Method EESSI JNSA ChallengePKI 2002 LDAP PKI Issues Liaison Copyright (c) 2003 NPO Page 15
16 DPV/DPD Strawpoll Tim Polk(NIST) RFC3379 SCVP, CVP, DVCS, OCSPv2 Matrix Matrix ML Matrix PKIXML SCVP RFC3379 Copyright (c) 2003 NPO Page 16
17 SCVP - Trevor Freemen (Microsoft) 5 57 LastCall MAC RFC3379? ValidationPolicy S/MIME, IPsec, TLS Copyright (c) 2003 NPO Page 17
18 Proxy Cert - Von Welch (Argonne Labs) EE ( )EE issueree ProxyCertificate critical ProxyCert ProxyCert WGLast Call Copyright (c) 2003 NPO Page 18
19 Copyright (c) 2003 NPO Page 19
20 Signature Algorithms & Key Usage Jim Schaad (Soaring Hawk Consulting) PKCS#1PSS/OAEPDH/DSA keyusage algorythmid Russ, Steve Kent, Tim Copyright (c) 2003 NPO Page 20
21 Copyright (c) 2003 NPO Page 21
22 Trusted Archive Protocol Carl Wallace (Cygnacom) ( ) Data Validation: Evidence verification Path Processing: Evidence Collection TSP message CMS DVCS? WG Draft MLTAP DVCS Peter Sylvester PKIXEXT PKIXAPPS WG Copyright (c) 2003 NPO Page 22
23 Copyright (c) 2003 NPO Page 23
24 QC Profile - Stefan Santesson (RetroSpekt) Scope For identify certs issued to physical persons # Legal Regurations? DN issuer RFC3280 keyusage nonrepudiation Copyright (c) 2003 NPO Page 24
25 Copyright (c) 2003 NPO Page 25
26 LDAP/X.500 alignment Skip Slone (Lockheed-Martin) X th 2005 ;binary enhanced Matching nonrepudiation contentcommitment Copyright (c) 2003 NPO Page 26
27 Subject Identification Method - Park Jong-Wook (KISA) non-public peronsl ID sensitive ID: national Id protection ID: national Id 3 revise Copyright (c) 2003 NPO Page 27
28 Copyright (c) 2003 NPO Page 28
29 EESSI Riccardo Genghini European Electronic Signature Standardization Initiative EU 57 th Vienna PKIX/EESSI Copyright (c) 2003 NPO Page 29
30 Copyright (c) 2003 NPO Page 30
31 JNSA ChallengePKI2002 JNSA Challenge PKI 2002 Copyright (c) 2003 NPO Page 31
32 Copyright (c) 2003 NPO Page 32
33 Copyright (c) 2003 NPO Page 33
34 LDAP PKI Issues David Chadwick (Univ of Salford) subjectdn CRL component matching Attribute Extraction CA/RA LDAP LDAP ComponentMatching Copyright (c) 2003 NPO Page 34
35 Copyright (c) 2003 NPO Page 35
36 Copyright (c) 2003 NPO Page 36
37 Copyright (c) 2003 NPO Page 37
38 Multi Domain PKI Test Suite -- Result of JNSA Challenge PKI Ryu Inada As representative of NPO Japan Network Security Association Sponsored by IT Promotion Agency, Japan
39 JNSA Challenge PKI 2002 As we reported on 11-Nov-2002/56 th IETF, we, JNSA, make a Multi Domain PKI Test Suite. We finished work at 28-Feb-2003, and prepare to open it public and translation to English. Estimated date of open to public: End of June 2003 Estimated date of translation to English : End of June Mar th IETF PKIX-WG 2
40 20-Mar th IETF PKIX-WG 3
41 PKI interoperability test suite 20-Mar th IETF PKIX-WG 4
42 Challenge PKI Test Cases 20-Mar th IETF PKIX-WG 5
43 Sample implementations In Java Worked on JDK 1.4 Based on Path Discovery/Path Validation API which provided from reference implementation. And additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. In C++ Worked on Microsoft Crypto API. Using Windows original Revocation Service Provider and additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. 20-Mar th IETF PKIX-WG 6
44 Requirement of GPKI and implementations Requirement Impl. of GPKI *1 CRL IDP ( issuing distribution point ) 20-Mar th IETF PKIX-WG 7
45 Sample implementation for 20-Mar th IETF PKIX-WG 8
46 Sample implementation for JAVA GPKICertPathBuilderSpi GPKICertPathChecker GPKICertPathValidatorSpi java.security.cert.* We extend original JDK s path builder/path checker interface. 20-Mar th IETF PKIX-WG 9
47 To achieve more Applicable Test Suite... Provide Framework more applicable & reusable Easy to extract minimal test case There are too many test cases about 256 cases. For easily modified to you purpose: PKIX, GPKI, and other frameworks Ready for Multi-domain PKI Re-usable for others No depend on environment Run on your local environment maybe linux or cygwin? We need two Reference!! Define multi-domain PKI PKI Define DB DB Schema to to re-use 20-Mar th IETF PKIX-WG 10
48 Related Links NPO JNSA IPA Security Center JNSA Challenge PKI Implementation Problems on PKI ( JNSA Challenge PKI 2001 ) nge2001.html The report of Challenge PKI in IETF Atlanta 20-Mar th IETF PKIX-WG 11
49 Demonstration 20-Mar th IETF PKIX-WG 12
untitled
better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge
More information第3 章 電子認証技術に関する国際動向
3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.
More informationuntitled
PKI 1 / SSL/TLS PKI 28 Oct 2005 PKI /JNSA PKI Day 3 PKI? 2 RFC 2459/RFC 3280/RFC 3280bis CRL(RFC 2459/RFC 3280/RFC 3280bis) OCSP(RFC 2560/Light-weight OCSP) SCVP(SCVP) CMP(RFC 2510/RFC 4210) CRMF(RFC 2511/RFC
More information<4D F736F F F696E74202D B F8089BB82CC88EA91A496CA C982A882AF82E9504B4982CC8FF38BB52E707074>
標準化の一側面 -- IETF における PKI の状況 -- 富士ゼロックス株式会社システム要素技術研究所稲田龍 概要 RFC 5280 (RFC 3280 の後継 ) が 2008 年 5 月に公開 PKI のインターネットでの利用のプロファイルが更新 PKI のインフラストラクチャとしての利用には決着がついたのか? 新たな暗号 ハッシュアルゴリズムの利用は?
More informationはじめに
19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30
More informationKatsuhito Asano Fujitsu LTD /Apr/2002 1
Katsuhito Asano Fujitsu LTD. 2002 24/Apr/2002 1 Sub-IP Area WG WG Sub-IP WG PWE3(Transport Area) L2TPEXT 2 Sub-IP Area Sub-IP Area MPLS 3 Sub-IP Area Sub-IP IP(Layer3) Media(Layer2) Layer2.5 Area The work
More informationPKIの標準化動向と リソースPKI
PKI Day 2009 2009 6 24 PKI PKI JPNIC RFC5280 PKI RFC5280 PKI RPKI IP RPKI RFC5280 RFC5280 RFC3280 PKI RFC5280 RFC5280 1/4 RFC5280 X.509-based PKI X.509CRL 2008 5published RFC5280 2/4 1988 1995 1997 1999
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More information/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More informationXMLを基盤とするビジネスプロトコルの動向
XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative
More information3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre
3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More informationYMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
More informationuntitled
WEB SAML 2.0 RSA 2005 SAML 2.0 2 1 3 Federated Identity The agreements, standards, and technologies that make identity and entitlements portable across autonomous domains. The Burton Group Web 4 2 Scope
More informationuntitled
1 2 1 3 IR... 4 2 5 1990 Surety 1990 2000 IETFISO/IEC 6 3 7 ISO/IEC 18014 IETF RFC 3161 Time-stamp Protocol ETSI TS 102 023RFC 3628) ETSI TS 101 861 8 4 (TSA, Time Stamping Authority) 1ab5c98f... 1ab5c98f...
More information電子メールのセキュリティ
S/MIME 1...1 1.1... 1 1.2... 2 1.3... 2 2...3 2.1... 3 2.2... 4 2.3... 4 3...5 3.1... 5 3.2... 6 3.3... 8 3.4... 10 4...12 4.1 PGP... 12 4.2 (CA)... 13 5 CRL...15 5.1 ( ID )... 15 5.2 CRL(Certificate Revocation
More informationsp c-final
NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More informationuntitled
PKI UTF8String Part4: IETF MicrosoftMSWindowsWindows 2000Windows NTWindows XPWindows Internet ExplorerOutlookOutlook Express Microsoft Corporation Sun MicrosystemsSun Java Solaris JavaJDK Sun Microsystems
More information, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei
, Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP
More informationWindows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.
Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise
More informationIC API
IC API Handa-F@mail.dnp.co.jp 2004 8 26 Copyright (c) 2004 NPO Page 2 IC API PKI IC PKCS#11 CSP (Cryptographic Service Provider) PKCS#11 CSP PKCS#15 GSC-IS Copyright (c) 2004 NPO Page 3 (identity token)
More informationT - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Intro
T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Introduction (DTR/TIPHON-01004-1 V0.1.5) 1.0 2001 8 30 THE
More informationuntitled
25: Part ( ) Chief Technology Officer mshindo@fivefront.com SNMP MRTG HP/OV RMON INTERNET WEEK 2006/12/08 Copyright 2006 Fivefront Corporation, All Rights Reserved. 2 1 SNMP IfInUcastPkts, IfOutUcastPkts
More information1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v
More informationMicrosoft PowerPoint - T9-inada-IW2002.ppt
IW2002 PKI 応用編 富士ゼロックス株式会社稲田龍 PKI アプリケーション 1 アプリケーションの動向 HTTPS S/MIME 電子署名アプリケーション HTTPS SSL を使い通信路の暗号化と接続先 ( 元 ) の認証を行う Internet Explorer/Netscape Navigator などが標準でサポート 多くの場合
More informationJP1/Integrated Management - Service Support 操作ガイド
JP1 Version 9 JP1/Integrated Management - Service Support 3020-3-R92-10 P-242C-8F94 JP1/Integrated Management - Service Support 09-50 OS Windows Server 2008 Windows Server 2003 OS JP1/Integrated Management
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information★保健医療科学_第67巻第2号.indb
Vol. No.p. Evidence Based Public Health: ICT/AI Issues of the internet environment in local governments Norihiko Ito 1), Hiroshi Mizushima 2) ) Hokkaido Mombetsu Health Center (Concurrently) Hokkaido Mombetsu
More information189 2015 1 80
189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87
More information楕円曲線暗号の整備動向 +楕円暗号の実装状況
楕円曲線暗号の整備動向 + 楕円暗号の実装状況 2011 年 2 23 筑波 学 岡晃 2011/2/23 JNSA PKI 相互運用 WG 1 IPA 情報セキュリティ技術動向調査 TG ( タスク グループ ) 広範な情報セキュリティ分野において 継続的に かつ 質の い技術情報を収集し続けるため 半期毎に発表会形式の会合を開催し 討議をふまえて調査報告書を作成します http://www.ipa.go.jp/security/outline/comm
More information幅広い業種や業務に適応可能なRFIDソリューション
RFID RFID Solution Applicable to Various Types of Business 吉 田 正 橋 本 繁 落 合 孝 直 あらまし UHF RFID Radio Frequency IDentification UHF RFID RFID UHF RFID Abstract UHF-band Radio Frequency IDentification (RFID)
More informationuntitled
UPKI JNSA PKI Day 2008 PKI 200873 Sapporo Sendai Osaka Kyoto Nagoya Tokyo Fukuoka (NII) 2008/7/3 PKI Day 2008 2 3 UPKI (Cyber Science Infrastructure) PKI 2008/7/3 PKI Day 2008 4 UPKI 16 7 NII 17 7KEKNII
More informationuntitled
DCMI nagamori@slis.tsukuba.ac.jp DCMI Metadata Schema Registry DCMI Dublin Core Metadata Initiative authoritative source 2004/10/29 2 1 Metadata is the information and documentation which makes data understandable
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationENUM
ENUM Internet Week DNS Day fujiwara@jprs.co.jp ENUM ENUM IETF ENUM WG Status ITU ENUM DNS ENUM 050 ENUM e164.arpa DNS ITU International Telecommunication Union ITU-T ITU Telecommunication Standardization
More informationマイナンバーカードによる認証と署名
Open Source Solution Technology Corporation HAMANO Tsukasa JNSA 電子署名 WG 秋祭り 君の署名は 目次 マイナンバーカードによる認証と署名 個人番号カードの中身 IC カードによる認証とデジタル署名 ユーザー認証 SSH 認証 /macos ログイン / ブラウザ デジタル署名 CMS 署名
More informationCisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More information- Principles for a Telecommunications management network 2.0 2001 11 27 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 2 JT-M3010 ...19...20...20...20...20...21...22...23...24 3 JT-M3010 ...26...28...29...34...34...35...35...37...37...37...37...37
More informationVol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N
Vol. 42 No. 6 June 2001 IREX-NE F 83.86 A Japanese Named Entity Extraction System Based on Building a Large-scale and High-quality Dictionary and Pattern-matching Rules Yoshikazu Takemoto, Toshikazu Fukushima
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More informationXJTAG
LDRA/ T-VEC/ MetaEdit+ Domain Specific Modeling Ashling/Jtag ARC SmartCards LAUTERBACH /Jtag ARM PowerPC K MIPS XJTAG HW Domain-Specific Modeling Domain-Specific Modeling Software Technology 30 Copyright
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More informationLC304_manual.ai
Stick Type Electronic Calculator English INDEX Stick Type Electronic Calculator Instruction manual INDEX Disposal of Old Electrical & Electronic Equipment (Applicable in the European Union
More informationuntitled
Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network
More informationJOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna
JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alternative approach using the Monte Carlo simulation to evaluate
More informationJuniper Networks Corporate PowerPoint Template
Juniper SRX 日本語マニュアル 41. SSL Forward Proxy の CLI 設定 はじめに SRX340 における SSL Forward Proxy の CLI 設定ついて説明します 手順内容は SRX340 JUNOS 15.1X49-D140 にて確認を実施しております SSL Proxy 機能については SRX340 以上の機種にてサポートされています 2018 年 8
More information署名ツール検証報告書
2010 01 27 XML 1.... 3 2.... 5 3.... 15 4.... 18 5.... 22 6.... 22 Copyright (c) XML 2010 All rights reserved. Page-1/23 Copyright (c) XML 2010 All rights reserved. Copyright (c) XML 2010 All rights reserved.
More informationuntitled
IC IC IC VJC IC 14 IC IC IC IC IC 2006 6 IC VJC IC 14 IC IC IC 1 IC IC 1 IC IC IC KANSAI 2 IC IC IC IC IC IC IC IC PiTaPa 1 IC IC IC 5 1 2 VISA VISA IC IC IC A A VISA A IC B VISA IC IC 3 IC IC IC IC IC
More informationJR4 JR 3 JR4 KUSUKI, Yukio JR 4 JR JR JR JR JR JR JR , ,530/90 17/ JR
JR4JR 3 JR4 KUSUKI, Yukio 1 1.1 2011JR4 JR JRJR JRJR4 20 5 JR41 2011 JR 82299 1,129101 307106 263109 4492 1,530/90 17/50 2 2020 JR 281106 375103 9494 88117 624 517/35 1/25 0 2020 3 JR 1,907101 1,864101
More informationuntitled
Japan College of Social Work 01 Japan College of Social Work Profile Contents Japan College of Social Work 02 01 Case 02 Case 03 Case 04 Case 05 Case 03 Japan College of Social Work Japan College of Social
More informationAgenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2
MAP Tutorial @ 1 Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2 IPv4 over IPv6 IPv6 network IPv4 service Internet Service ProviderISP IPv4 service
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More informationGoogle Social Influences and Legal Issues of Google Street View Hiroshi Takada
Social Influences and Legal Issues of Google Street View Hiroshi Takada Sanno University Bulletin Vol. No. September Social Influences and Legal Issues of Google Street View Hiroshi Takada In this paper,
More informationIPv6 IPv IETF IPv6 2
IPv6 IPv6 2003 2 3 1 IETF IPv6 2 2001, 2002 RIR IPv6 IETF IPv6 3 IETF (1/2) IETF (Internet Engineering Task Force) IPv6 WG 2001 IPng (IP Next Generation) WG IPv6 WG IPng Home Page: http://playground.sun.com/ipng
More information集中講義 インターネットテクノロジー 第5回
5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of
More informationuntitled
Interfaculty Initiative in Information Studies, The University of Tokyo 2 Interfaculty Initiative in Information Studies, The University of Tokyo > > 517587 82 > > > > > 3 Interfaculty Initiative in Information
More informationMicrosoft Intune MDM ソリューション向けDigiCert® 統合ガイド
Microsoft Intune MDM DigiCert 2018 7 31 Microsoft Intune MDM DigiCert : 2018 7 31 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More informationMicrosoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)
(2017.04 29 36 234 9 1 1. (1) 3 (2) 9 1 2 2. (1) 9 1 1 2 1 2 (2) 1 2 ( PSE-RE-101/205/306/405 2 PSE-RE-201 PSE-RE-301 PSE-RE-401 PSE-RE-302 PSE-RE-202 PSE-RE-303 PSE-RE-402 PSE-RE-203 PSE-RE-304 PSE-RE-403
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informatione-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto
e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa
More informationEncryption Security
200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML
More informationuntitled
Vista PKI PKI IE7IE7 Kiyoshi Watanabe, CISSP Security Center of Excellence (SCOE) Microsoft Vista Windows 2008 Vista, IE7, PKI Enrollment Credential CNG Bit Locker NAP IE7 Vista 6 http://www.csoonline.com/pdf/6_month_vista_vuln_report.pdf
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationSUMMARY There might be no other business that has high uncertainty like Live Entertainment Business. This is because the success and failure of this business depend a great deal on the unscientific element
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationインターネットレジストリにおける レジストリデータの保護と応用
JPOPM15 2008 年 11 月 27 日秋葉原コンベンションホール RIR/JPNIC における電子認証技術と インターネット経路制御のセキュリティ向上に関する動向 木村泰司 内容 RIR/JPNIC における電子認証技術 インターネット経路制御のセキュリティ向上に向けた取り組み JPNIC における取り組み Copyright 2008 Japan Network Information
More informationrzat10pdf.ps
IBM i 7.2 IBM Navigator for i IBM IBM i 7.2 IBM Navigator for i IBM 9 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Connecting to your system Connecting to IBM Navigator for i Copyright IBM Corporation
More informationRPKIとインターネットルーティングセキュリティ
RPKI とインターネット ルーティングセキュリティ ~ ルーティングセキュリティの未来 ~ セキュリティ事業担当 木村泰司 内容 1. リソース証明書と RPKI 2. 国際的な動きと標準化動向 3. ディスカッションのポイント 2 1 リソース証明書と RPKI リソース証明書とは ~ アドレス資源の 正しさ ~ イ ) これは正しいアドレスだ whois $ whois h whois.nic.ad.jp
More informationuntitled
ISO 26262 : 2011(E) Functional safety nal 2 Managem ment of functio safety 3 Con ncept phase Annex B Examples for evaluating a safety culture Annex C (informative) Aim of the confirmation measures 8 Functional
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More information証明書検証サーバ
(Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)
More informationAll Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1
asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information2011 NTT Information Sharing Platform Laboratories
NGN IPv6 multi-homing uplink load balancing 2 3 4 uplink uplink prefix domain A domain A prefix prefix prefix = longest match domain A domain A DNS Server domain A domain B 5 uplink uplink prefix domain
More informationWeb ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval
SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto
More information2002 8 2
2002 8 2 1....1 1.1.... 1 1.2. PKI IPsec... 1 2....2 2.1. VPN... 2 2.2.... 3 3....4 3.1. VPN PKI... 4 3.2.... 5 3.3. IPsec... 6 4....7 4.1. VPN PKI... 7 4.2.... 7 4.3. IPsec...11 5.... 21 5.1.... 21 5.2....
More informationTrial Study to Aggregate the Flow of Relief Funds for the Great East Japan Earthquake: Matrix of Relief Fund Inflow and Outflow Abstract The 2011 Grea
東日本大震災における援助資金フロー捕捉の試み Title インフローとアウトフローに関する援助資金マトリッ クス Author(s) 中嶋, 貴子, 馬場, 英朗 Citation 計画行政, 38(4): 39-49 Issue Date 2015-11 URL http://hdl.handle.net/10112/10206 Rights Type Journal Article Textversion
More information資料1-3
WPT (2017) ( ) *JST Center of Innovation ( 13- ) Last 5X * 16 8, 15 7, 14 6 METLAB 16 20, 15 18 WPT * IEEE MTTS Wireless Power Transfer Conference ( 11-, ) MTTS TC-26 (Wireless Energy Transfer and Conversion
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More information2
2 3 ( 4 1) ( 49 8) ( 49 82) ( 49 822) ( 49 823) ( 49 14) ( 49 14) ( 49 14) 49 14 ( 49 17) ( 49 202) IEEE802.11 ( 49 201) IEEE802.11 Bluetooth 5GHz ( 49 203) IEEE802.11 ( 49 204) 5GHz ( 49 21) IEEE802.11
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More information2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /, , 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +
1 BSE *,**+ 3 BSE,**- +23,2 + +,3 3+,**, * 2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /,341 24-14+ 24- +-4, 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +/4../42,240
More informationwide97.dvi
11 321 1 CA (Certication Authority) ( ) 1 3 CA S/MIME[104][105][106] SSL[107](Secure Sockets Layer), TLS[108](Transport Layer Security) WWW Netscape Microsoft Web SSL CA CA CA CA CA CA CA members only
More informationJPGRID-GGF0205 第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track
第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track 3: Developing & Administrating Globus Toolkit 2.2 8 Workshop 1: Grid
More information3. /dev/urandom 1024 ~CA0/private/cakey.pem $ openssl genrsa -rand /dev/urandom -out \ private/cakey.pem 1024 Generating RSA private key
PKI : OpenSSL CA NISOC @ 2007/01/06 1 CA:Certificate Authority OpenSSL CA CA0 CA0 2 CA CA1 CA2 3 CA CA1 CA2 PC CA CA 2 CA CA0 1. CA ~CA0 openssl.cnf [ CA default ] dir ~CA0 [ req distinguished name ] CSR
More informationOracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
More informationRTM RTM Risk terrain terrain RTM RTM 48
Risk Terrain Model I Risk Terrain Model RTM,,, 47 RTM RTM Risk terrain terrain RTM RTM 48 II, RTM CSV,,, RTM Caplan and Kennedy RTM Risk Terrain Modeling Diagnostics RTMDx RTMDx RTMDx III 49 - SNS 50 0
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More information橡C12電子メール最新技術動向revisd.PDF
Internet Week 99 Internet Week 99 1999 Naoaki Watanabe,Japan Network Information Center 1... 1 2... 1 3... 2 4... 5 5... 7 6 IMAP4... 10 7 S/MIME PGP... 14 8... 18 9... 19 IMAP4 Happy99 OutLook Exchange
More information