new-trusted-os.PDF

Size: px
Start display at page:

Download "new-trusted-os.PDF"

Transcription

1 security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model 2002 Slide ( ) International R&D 1990 ( ) ( ) ( ( ( ( ( SC 27/WG 1 Slide 2 Copyright 2001,2002 HP Page 1

2 Slide 3 DMZ 1 2 TCSEC-BLS, CMWEC 3 Slide 4 Copyright 2001,2002 HP Page 2

3 OS OpenHack 2 (Y2000) OpenHack 3 (Y2001) Slide 5 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 6 Copyright 2001,2002 HP Page 3

4 subject access object Slide 7 illegal access unauthorized access abuse of authorization Slide 8 Copyright 2001,2002 HP Page 4

5 Slide 9 CLASSIFICATION DESIGN CLASSIFICATION MODEL clearances sensitivity levels + compartments markings - (worst practice: floating label) HOW TO BE HANDLED (not based on attribute) CRITERIA TO CLASSIFY when? at creation (concern about 1:N) who? by creator (concern about 1:N) what? Just Enough (is better than Baseline) Slide 10 Copyright 2001,2002 HP Page 5

6 Step 1.4 Classification (Level, Compartment & Marking) Slide 11 security strength depends on audit enforced by integrity ex) WRITE UP makes containment against abuse of authorization / Slide 12 Copyright 2001,2002 HP Page 6

7 CLASSIFICATION AUTHENTICATION ACCESS CONTROL INFORMATION FLOW CONTROL LEAST PRIVILEGE AUTHORIZATION (DUAL LOCK) AUDITING covert channel Audit Trail Slide 13 DUAL LOCKED AUTHORIZATION sysadmin i.s. system officer (user) (owner) (custodian) (guardian) Slide 14 Copyright 2001,2002 HP Page 7

8 Slide 15 Step 4.1 awareness Step 4.2 education Step 4.3 training Slide 16 Copyright 2001,2002 HP Page 8

9 PREVENTION PROTECTION penetration detection REACTION REPORT proactive X X x x plan in advance incident reactive improve X X * trap (pitfall on the term REACTION ) Slide 17 ISO/IEC (JIS X5070) TOE - Target of Evaluation - PP - Protection Profile - ST - Security Target - EAL - Evaluation Assurance Level EAL Slide 18 Copyright 2001,2002 HP Page 9

10 ISO/IEC JIS X 5070 CC V2.1 CCRA Slide 19 Partnership with ISO Common Criteria development group made significant effort to get criteria adopted as an international standard (ISO/IEC 15408) Need to maintain regular and consistent coordination/liaison with ISO SC 27 Working Group 3 but this effort requires resources which tend to be limited : CCRA History, Implementation, Future E`xpansion, and International Experiences Dr. Stuart Katzke / National Institute of Standards and Technology Slide 20 Copyright 2001,2002 HP Page 10

11 No new versions until April 2003 (at the earliest) Request for Interpretations (as of February 2002) 206 Total Requests for Interpretation Final interpretation is a change to the CC/CEM 16 months average time to process Labor intensive: requires significant preparation/coordination Limited resources Requires unanimous consent : Future Directions of the Common Criteria (CC) and the Common Evaluation Methodology (CEM) Dr. Stuart Katzke / National Institute of Standards and Technology Slide 21 Bell-La Padula Slide 22 Copyright 2001,2002 HP Page 11

12 Bell-La Padula hp secure linux Slide 23 SYSTEM HIGH DB Internet eth0 Web eth1 intranet Mail System Slide 24 Copyright 2001,2002 HP Page 12

13 HOST * -> COMPARTMENT web PORT 80 METHOD tcp NETDEV lan_eth0 COMPARTMENT web -> COMPARTMENT tomcat1 PORT 8007 METHOD tcp NETDEV lan_lo COMPARTMENT web -> COMPARTMENT tomcat2 PORT 8008 METHOD tcp NETDEV lan_lo COMPARTMENT tomcat1 -> HOST server1 PORT 8080 METHOD tcp NETDEV lan_eth1 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 25 web /compt/web read active web /compt/web/tmp read,write active web /compt/web/apache/logs append active web / none active Slide 26 Copyright 2001,2002 HP Page 13

14 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 27 hp secure linux # ls -ln -rw-r--r Nov 16 04:45 access.conf -rw-r--r Nov 16 04:45 httpd.conf -rw-r--r Nov 16 04:45 mime.types -rw-r--r Nov 16 04:45 srm.conf -rwxrwxrwx Dec 24 23:32 openfile # echo abc > httpd.conf sh: httpd.conf: Operation not permitted # who root tty1 Dec 25 03:10 # echo abc >> openfile sh: openfile: Operation not permitted # rm access.conf rm: cannot unlink access.conf : Operation not # Slide 28 Copyright 2001,2002 HP Page 14

15 Bell-La Padula hp secure linux ppt PDF Slide 29 Bell-La Padula SYSTEM HIGH tomcat1 Internet eth0 Web tomcat2 eth1 intranet System server1 Slide 30 Copyright 2001,2002 HP Page 15

16 Bell-La Padula Bell-La Padula Slide 31 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 32 Copyright 2001,2002 HP Page 16

17 Slide 33 subject access object Slide 34 Copyright 2001,2002 HP Page 17

18 Slide 35 Military grade C I A Military C I A (A) Slide 36 Copyright 2001,2002 HP Page 18

19 Word from MORPHEUS / Slide 37 Slide 38 Copyright 2001,2002 HP Page 19

CIA+

CIA+ ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common

More information

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101

More information

A B C B C ICT ICT ITC ICT

A B C B C ICT ICT ITC ICT ICT Development of curriculum for improving of teachers ICT based on evaluation standards. Kazuhiko ISHIHARA Abstract Ministry of Education and Science announced Checklist of teacher s ICT in March,. All

More information

評論・社会科学 84号(よこ)(P)/3.金子

評論・社会科学 84号(よこ)(P)/3.金子 1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

.N..

.N.. Examination of the lecture by the questionnaire of class evaluation -Analysis and proposal of result at the first term of fiscal year - Kazuo MORI, Tukasa FUKUSHIMA, Michio TAKEUCHI, Norihiro UMEDA, Katuya

More information

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

2

2 2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

Frequently Asked Questions (FAQ) About Sunsetting the SW-CMMR

Frequently Asked Questions (FAQ) About Sunsetting the SW-CMMR SW-CMM FAQ(Frequently Asked Questions) SEI Frequently Asked Questions (FAQ) About Sunsetting the SW-CMM The SEI Continues Its Commitment to CMMI SEI SEI SEI PDF WWW [email protected] 2002/11/27 SEI

More information

Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,

Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS, Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,

More information

日本国憲法における「社会福祉」

日本国憲法における「社会福祉」 No.22 2001 11 Abstract The usage of the term social welfare started after the World War II in Japan, in article 25 of the Constitution enacted in 1946. The term appeared while the Diet was debating on

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

A5 PDF.pwd

A5 PDF.pwd Kwansei Gakuin University Rep Title Author(s) 家 族 にとっての 労 働 法 制 のあり 方 : 子 どもにとっての 親 の 非 正 規 労 働 を 中 心 に Hasegawa, Junko, 長 谷 川, 淳 子 Citation 法 と 政 治, 65(3): 193(825)-236(868) Issue Date 2014-11-30 URL

More information

[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7 32 (2015 ) [2] Projects of the short term increase at present. In order to let projects complete without rework and delays, it is important that request for proposals (RFP) are written by reflecting precisely

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

YUHO

YUHO -1- -2- -3- -4- -5- -6- -7- -8- -9- -10- -11- -12- -13- -14- -15- -16- -17- -18- -19- -20- -21- -22- -23- -24- -25- -26- -27- -28- -29- -30- -31- -32- -33- -34- -35- -36- -37- -38- -39- -40- -41- -42-

More information

MRI | 所報 | 分権経営の進展下におけるグループ・マネジメント

MRI  | 所報 | 分権経営の進展下におけるグループ・マネジメント JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 [email protected] 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,

More information

2 94

2 94 32 2008 pp. 93 106 1 Received October 30, 2008 The purpose of this study is to examine the effects of aerobics training class on weight loss for female students in HOKURIKU UNIVERSITY. Seventy four female

More information

Bull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching

Bull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching Bull. of Nippon Sport Sci. Univ. 47 (1) 45 70 2017 Devising musical expression in teaching methods for elementary music An attempt at shared teaching materials for singing and arrangements for piano accompaniment

More information

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~ HCDUX Approach of Applying Design Technology to System Development Process: From HCD to UX Design 善方日出夫 小川俊雄 あらまし HCDHuman Centered Design SE SDEMHCDUIUser Interface RIARich Internet ApplicationUXUser

More information

Building a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,

More information

大学における原価計算教育の現状と課題

大学における原価計算教育の現状と課題 1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

etrust Access Control etrust Access Control UNIX(Linux, Windows) 2

etrust Access Control   etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control 3 ID 10 ID SU ID root 4 OS OS 2 aaa 3 5 TCP/IP outgoing incoming DMZ 6 OS setuid/setgid) OS

More information

212013pp. 1 13 2 1 4 1980 1987 74.91997 70.12007 2014 1 31 1 64.4201161.8 1 2 3 1 3 2 4 3 2006 5 1 2 6 2 25.6 7 23.11 4.1 3.4 2 12.4 9.7 3.8 5.9 50.0 81.8 75.060.0 95.070.0 65.0 25.6 23.1 4.1 3.4 2006

More information

,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki

More information

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ

産業構造におけるスポーツ産業の範囲に関する研究Ⅰ Abstract This study is emphasizes that the sports industry holds big weight with the economy of our country but tends to be disregarded The study sees it us a peculiar industry which has ports of both

More information

March IT PR March March p p p PR March Vol. March p p p SN March SN PR PR March Potential Needs of Specialized Foster Parents for Abused Children: Analyzinga questionnaire survey on foster parents needs

More information

Dill,, pp. - - EU i - - i - - - COE - COE COE COE Good Practice GP GP GP GP JABEE INQAAHE PDCA Plan-Do-Check-Action - FD FD - - Rice,, p. niche - i - -Jones,, pp. - MCAT - - - - - - - - - - - - - -

More information

2 Web Security for the Enterprise

2 Web Security for the Enterprise The Web Security Authority. Web Security for the Enterprise: How to increase protection against port 80 threats White Paper 2 Web Security for the Enterprise How to increase protection against port 80

More information

第33回鋼構造基礎講座 鋼橋の架設および解体撤去工法-より一層の安全性と品質の向上に向けて-

第33回鋼構造基礎講座 鋼橋の架設および解体撤去工法-より一層の安全性と品質の向上に向けて- 1 2 600000 500000 400000 300000 200000 117910 100000 15058 0 33343536373839404142434445464748495051525354555657585960616263 2 3 4 5 6 7 8 9 10111213141516171819202122232425262728 3 140000 200 120000 100000

More information

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa

More information

FA FA FA FA FA 5 FA FA 9

FA FA FA FA FA 5 FA FA 9 30 29 31 1993 2004 The process of the labor negotiations of Japan Professional Baseball Players Association, 1993 2004 ABE Takeru Graduate School of Social Science, Hitotsubashi University Abstract The

More information

Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows

Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker Centric Manager IT Service

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

スライド 1

スライド 1 IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS

More information

1994 2002 2002 * 1 e CD-ROM e e e 3 e e e CD-ROM DVD CBT(Computer Based Training) e 2002 e e electronic( ) WBT Web Based Training on-demand IT e e 1 y

1994 2002 2002 * 1 e CD-ROM e e e 3 e e e CD-ROM DVD CBT(Computer Based Training) e 2002 e e electronic( ) WBT Web Based Training on-demand IT e e 1 y e e Principles for the Development of E-learning Courses and a Progress Report describing the Creation of an E-learning Course in Japanese Writing Practice for Intermediate and Advanced Students e e e

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

Microsoft PowerPoint - #07 Quiz Are you still with me .pptx

Microsoft PowerPoint - #07 Quiz Are you still with me .pptx Quiz: Are You Still With Me? Takumi Information Technology Maiko Akutagawa Copyright Takumi Information Techonology CORPORATION, All rights reserved. What s Direct Identifier? -level1 Is it compulsory

More information

Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen

Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen SATO Label Gallery SATO International Pte Ltd Version : BSI-021227-01 Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work

More information

08_中嶋真美.indd

08_中嶋真美.indd 56 2015 pp. 175 190 CBT CBT CBT UNWTO 2015 2013 10 2015 11 3,300 2010 2030 3.3 2030 182014 1 2,450 GDP 9 2016 1 30 175 56 UNESCO 2010 Living Heritage Cultural Landscape Community-Based Tourism 2002UNWTO

More information

企業内システムにおけるA j a x 技術の利用

企業内システムにおけるA j a x 技術の利用 Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...

More information

ITSM.PDF

ITSM.PDF HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed

More information

unix.dvi

unix.dvi 1 UNIX 1999 4 27 1 UNIX? 2 1.1 Windows/Macintosh? : : : : : : : : : : : : : : : : : : : : : : : : 2 1.2 UNIX OS : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 1.3 : : : : : : : : : : : :

More information

デフレの定義(最新版).PDF

デフレの定義(最新版).PDF DP/01-1 Director General for Economic Assessment and Policy Analysis CABINET OFFICE E-mail : [email protected] 1 2 3 i (ii) 4 5 Deflation defined as at least two consecutive years of price decreases.

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

Phonetic Perception and Phonemic Percepition

Phonetic Perception and Phonemic Percepition No.7, 587-598 (2006) The Historical and Social Significance of Foreign Brides in the Uonuma Region of Niigata Prefecture (1) TAKEDA Satoko Nihon University, Graduate School of Social and Cultural Studies

More information

L3 Japanese (90570) 2008

L3 Japanese (90570) 2008 90570-CDT-08-L3Japanese page 1 of 15 NCEA LEVEL 3: Japanese CD TRANSCRIPT 2008 90570: Listen to and understand complex spoken Japanese in less familiar contexts New Zealand Qualifications Authority: NCEA

More information

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp

More information

5005-toku3.indd

5005-toku3.indd 3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG

More information

日本看護管理学会誌15-2

日本看護管理学会誌15-2 The Journal of the Japan Academy of Nursing Administration and Policies Vol. 15, No. 2, PP 135-146, 2011 Differences between Expectations and Experiences of Experienced Nurses Entering a New Work Environment

More information

ø ø Lessons Learned from the Worldwide Spread of Evidence-Based Medicine (EBM) Abstract Keywords Evidence-based Policies in Education: New Directions and Issues Abstract Keywords Contribution

More information

4 23 4 Author s E-mail Address: [email protected]; [email protected] Japanese Elementary School Teachers Four Skills English Ability: A Self-evaluation Analysis YAMAUCHI Keiko, SAKUI Keiko Faculty

More information

25 201002666 1 4 1.1................................... 4 1.2.................................. 5 1.3............................... 5 1.3.1 RBAC................. 5 2 7 2.1..............................

More information

07_伊藤由香_様.indd

07_伊藤由香_様.indd A 1 A A 4 1 85 14 A 2 2006 A B 2 A 3 4 86 3 4 2 1 87 14 1 1 A 2010 2010 3 5 2 1 15 1 15 20 2010 88 2 3 5 2 1 2010 14 2011 15 4 1 3 1 3 15 3 16 3 1 6 COP10 89 14 4 1 7 1 2 3 4 5 1 2 3 3 5 90 4 1 3 300 5

More information

) ,

) , Vol. 2, 1 17, 2013 1986 A study about the development of the basic policy in the field of reform of China s sports system 1986 HaoWen Wu Abstract: This study focuses on the development of the basic policy

More information

(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]

(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2] / 1995 Grid Access Model 1. (1) 22 1998 12 11 2000-1- (2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]

More information

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Education of Disaster Preparedness System and Class Practice

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information