new-trusted-os.PDF
|
|
- きゅういち こやぎ
- 5 years ago
- Views:
Transcription
1 security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model 2002 Slide ( ) International R&D 1990 ( ) ( ) ( ( ( ( ( SC 27/WG 1 Slide 2 Copyright 2001,2002 HP Page 1
2 Slide 3 DMZ 1 2 TCSEC-BLS, CMWEC 3 Slide 4 Copyright 2001,2002 HP Page 2
3 OS OpenHack 2 (Y2000) OpenHack 3 (Y2001) Slide 5 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 6 Copyright 2001,2002 HP Page 3
4 subject access object Slide 7 illegal access unauthorized access abuse of authorization Slide 8 Copyright 2001,2002 HP Page 4
5 Slide 9 CLASSIFICATION DESIGN CLASSIFICATION MODEL clearances sensitivity levels + compartments markings - (worst practice: floating label) HOW TO BE HANDLED (not based on attribute) CRITERIA TO CLASSIFY when? at creation (concern about 1:N) who? by creator (concern about 1:N) what? Just Enough (is better than Baseline) Slide 10 Copyright 2001,2002 HP Page 5
6 Step 1.4 Classification (Level, Compartment & Marking) Slide 11 security strength depends on audit enforced by integrity ex) WRITE UP makes containment against abuse of authorization / Slide 12 Copyright 2001,2002 HP Page 6
7 CLASSIFICATION AUTHENTICATION ACCESS CONTROL INFORMATION FLOW CONTROL LEAST PRIVILEGE AUTHORIZATION (DUAL LOCK) AUDITING covert channel Audit Trail Slide 13 DUAL LOCKED AUTHORIZATION sysadmin i.s. system officer (user) (owner) (custodian) (guardian) Slide 14 Copyright 2001,2002 HP Page 7
8 Slide 15 Step 4.1 awareness Step 4.2 education Step 4.3 training Slide 16 Copyright 2001,2002 HP Page 8
9 PREVENTION PROTECTION penetration detection REACTION REPORT proactive X X x x plan in advance incident reactive improve X X * trap (pitfall on the term REACTION ) Slide 17 ISO/IEC (JIS X5070) TOE - Target of Evaluation - PP - Protection Profile - ST - Security Target - EAL - Evaluation Assurance Level EAL Slide 18 Copyright 2001,2002 HP Page 9
10 ISO/IEC JIS X 5070 CC V2.1 CCRA Slide 19 Partnership with ISO Common Criteria development group made significant effort to get criteria adopted as an international standard (ISO/IEC 15408) Need to maintain regular and consistent coordination/liaison with ISO SC 27 Working Group 3 but this effort requires resources which tend to be limited : CCRA History, Implementation, Future E`xpansion, and International Experiences Dr. Stuart Katzke / National Institute of Standards and Technology Slide 20 Copyright 2001,2002 HP Page 10
11 No new versions until April 2003 (at the earliest) Request for Interpretations (as of February 2002) 206 Total Requests for Interpretation Final interpretation is a change to the CC/CEM 16 months average time to process Labor intensive: requires significant preparation/coordination Limited resources Requires unanimous consent : Future Directions of the Common Criteria (CC) and the Common Evaluation Methodology (CEM) Dr. Stuart Katzke / National Institute of Standards and Technology Slide 21 Bell-La Padula Slide 22 Copyright 2001,2002 HP Page 11
12 Bell-La Padula hp secure linux Slide 23 SYSTEM HIGH DB Internet eth0 Web eth1 intranet Mail System Slide 24 Copyright 2001,2002 HP Page 12
13 HOST * -> COMPARTMENT web PORT 80 METHOD tcp NETDEV lan_eth0 COMPARTMENT web -> COMPARTMENT tomcat1 PORT 8007 METHOD tcp NETDEV lan_lo COMPARTMENT web -> COMPARTMENT tomcat2 PORT 8008 METHOD tcp NETDEV lan_lo COMPARTMENT tomcat1 -> HOST server1 PORT 8080 METHOD tcp NETDEV lan_eth1 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 25 web /compt/web read active web /compt/web/tmp read,write active web /compt/web/apache/logs append active web / none active Slide 26 Copyright 2001,2002 HP Page 13
14 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 27 hp secure linux # ls -ln -rw-r--r Nov 16 04:45 access.conf -rw-r--r Nov 16 04:45 httpd.conf -rw-r--r Nov 16 04:45 mime.types -rw-r--r Nov 16 04:45 srm.conf -rwxrwxrwx Dec 24 23:32 openfile # echo abc > httpd.conf sh: httpd.conf: Operation not permitted # who root tty1 Dec 25 03:10 # echo abc >> openfile sh: openfile: Operation not permitted # rm access.conf rm: cannot unlink access.conf : Operation not # Slide 28 Copyright 2001,2002 HP Page 14
15 Bell-La Padula hp secure linux ppt PDF Slide 29 Bell-La Padula SYSTEM HIGH tomcat1 Internet eth0 Web tomcat2 eth1 intranet System server1 Slide 30 Copyright 2001,2002 HP Page 15
16 Bell-La Padula Bell-La Padula Slide 31 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 32 Copyright 2001,2002 HP Page 16
17 Slide 33 subject access object Slide 34 Copyright 2001,2002 HP Page 17
18 Slide 35 Military grade C I A Military C I A (A) Slide 36 Copyright 2001,2002 HP Page 18
19 Word from MORPHEUS / Slide 37 Slide 38 Copyright 2001,2002 HP Page 19
new-trusted-os3.PDF
security 101 Identity Management Provisioning IPA 2002 Slide 1 security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model Identity
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationuntitled
TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c
More informationCIA+
ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More informationuntitled
TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for
More informationInformation Security Management System ISMS Copyright JIPDEC ISMS,
ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More informationuntitled
17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More informationA B C B C ICT ICT ITC ICT
ICT Development of curriculum for improving of teachers ICT based on evaluation standards. Kazuhiko ISHIHARA Abstract Ministry of Education and Science announced Checklist of teacher s ICT in March,. All
More information評論・社会科学 84号(よこ)(P)/3.金子
1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information.N..
Examination of the lecture by the questionnaire of class evaluation -Analysis and proposal of result at the first term of fiscal year - Kazuo MORI, Tukasa FUKUSHIMA, Michio TAKEUCHI, Norihiro UMEDA, Katuya
More informationJIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information2
2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.
More informationrzamhpdf.ps
IBM i 7.2 IBM i 7.2 43 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Security Service Tools 1 2014.4 Copyright IBM Corporation 2003, 2013. .............. 1 IBM i 7.2............ 1 PDF.........
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informationV ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE
V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More informationuntitled
DCMI nagamori@slis.tsukuba.ac.jp DCMI Metadata Schema Registry DCMI Dublin Core Metadata Initiative authoritative source 2004/10/29 2 1 Metadata is the information and documentation which makes data understandable
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More informationST作成の手引
7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria
More informationFrequently Asked Questions (FAQ) About Sunsetting the SW-CMMR
SW-CMM FAQ(Frequently Asked Questions) SEI Frequently Asked Questions (FAQ) About Sunsetting the SW-CMM The SEI Continues Its Commitment to CMMI SEI SEI SEI PDF WWW norimatsu@np-lab.com 2002/11/27 SEI
More informationInformation Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information日本国憲法における「社会福祉」
No.22 2001 11 Abstract The usage of the term social welfare started after the World War II in Japan, in article 25 of the Constitution enacted in 1946. The term appeared while the Diet was debating on
More information12 13 ( (C)(2))
12 13 ( (C)(2)) 1 ,,,,,, 2 [1] 97 2000.9pp.35-52 [2] 98 2001.3pp.21-38 [1] K. Asai, "Recurrent Education in Teacher Education: The Japan Experience", Conference Program International Conference on Teacher
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationA5 PDF.pwd
Kwansei Gakuin University Rep Title Author(s) 家 族 にとっての 労 働 法 制 のあり 方 : 子 どもにとっての 親 の 非 正 規 労 働 を 中 心 に Hasegawa, Junko, 長 谷 川, 淳 子 Citation 法 と 政 治, 65(3): 193(825)-236(868) Issue Date 2014-11-30 URL
More informationスライド 1
Asian Inter-regional Professional Securities Market 200761 NIRA 20006 2002/6 2006/5 2009/1 2003/4 CP 2006/1 2007/1 2004/5 DVP 9/11 T+1 T+3 Customer First, Information Technology, Global Standard, Contestability
More information[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7
32 (2015 ) [2] Projects of the short term increase at present. In order to let projects complete without rework and delays, it is important that request for proposals (RFP) are written by reflecting precisely
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationYUHO
-1- -2- -3- -4- -5- -6- -7- -8- -9- -10- -11- -12- -13- -14- -15- -16- -17- -18- -19- -20- -21- -22- -23- -24- -25- -26- -27- -28- -29- -30- -31- -32- -33- -34- -35- -36- -37- -38- -39- -40- -41- -42-
More informationISMSクラウドセキュリティ認証の概要
Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015
More informationMRI | 所報 | 分権経営の進展下におけるグループ・マネジメント
JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 E-mailprd@mri.co.jp 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,
More information2 94
32 2008 pp. 93 106 1 Received October 30, 2008 The purpose of this study is to examine the effects of aerobics training class on weight loss for female students in HOKURIKU UNIVERSITY. Seventy four female
More informationBull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching
Bull. of Nippon Sport Sci. Univ. 47 (1) 45 70 2017 Devising musical expression in teaching methods for elementary music An attempt at shared teaching materials for singing and arrangements for piano accompaniment
More informationシステム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~
HCDUX Approach of Applying Design Technology to System Development Process: From HCD to UX Design 善方日出夫 小川俊雄 あらまし HCDHuman Centered Design SE SDEMHCDUIUser Interface RIARich Internet ApplicationUXUser
More informationBuilding a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationetrust Access Control etrust Access Control UNIX(Linux, Windows) 2
etrust Access Control etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control 3 ID 10 ID SU ID root 4 OS OS 2 aaa 3 5 TCP/IP outgoing incoming DMZ 6 OS setuid/setgid) OS
More information212013pp. 1 13 2 1 4 1980 1987 74.91997 70.12007 2014 1 31 1 64.4201161.8 1 2 3 1 3 2 4 3 2006 5 1 2 6 2 25.6 7 23.11 4.1 3.4 2 12.4 9.7 3.8 5.9 50.0 81.8 75.060.0 95.070.0 65.0 25.6 23.1 4.1 3.4 2006
More information,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki
More information産業構造におけるスポーツ産業の範囲に関する研究Ⅰ
Abstract This study is emphasizes that the sports industry holds big weight with the economy of our country but tends to be disregarded The study sees it us a peculiar industry which has ports of both
More informationMarch IT PR March March p p p PR March Vol. March p p p SN March SN PR PR March Potential Needs of Specialized Foster Parents for Abused Children: Analyzinga questionnaire survey on foster parents needs
More informationDill,, pp. - - EU i - - i - - - COE - COE COE COE Good Practice GP GP GP GP JABEE INQAAHE PDCA Plan-Do-Check-Action - FD FD - - Rice,, p. niche - i - -Jones,, pp. - MCAT - - - - - - - - - - - - - -
More information2 Web Security for the Enterprise
The Web Security Authority. Web Security for the Enterprise: How to increase protection against port 80 threats White Paper 2 Web Security for the Enterprise How to increase protection against port 80
More information研究レポート表紙.PDF
No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000
More information第33回鋼構造基礎講座 鋼橋の架設および解体撤去工法-より一層の安全性と品質の向上に向けて-
1 2 600000 500000 400000 300000 200000 117910 100000 15058 0 33343536373839404142434445464748495051525354555657585960616263 2 3 4 5 6 7 8 9 10111213141516171819202122232425262728 3 140000 200 120000 100000
More informationVol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus
Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa
More informationFA FA FA FA FA 5 FA FA 9
30 29 31 1993 2004 The process of the labor negotiations of Japan Professional Baseball Players Association, 1993 2004 ABE Takeru Graduate School of Social Science, Hitotsubashi University Abstract The
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationuntitled
c 816 Web 1. 30 [1] [2] [3, 4] [5] 10 [6] 185 8540 2 8 38 [5] [5, 7] [5] 3 (1) 608 18 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. (2) (3) 2. 2.1 Web 2014 1 2013 12 2.2
More informationSystemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows
Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker Centric Manager IT Service
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationスライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
More information1994 2002 2002 * 1 e CD-ROM e e e 3 e e e CD-ROM DVD CBT(Computer Based Training) e 2002 e e electronic( ) WBT Web Based Training on-demand IT e e 1 y
e e Principles for the Development of E-learning Courses and a Progress Report describing the Creation of an E-learning Course in Japanese Writing Practice for Intermediate and Advanced Students e e e
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationMicrosoft PowerPoint - #07 Quiz Are you still with me .pptx
Quiz: Are You Still With Me? Takumi Information Technology Maiko Akutagawa Copyright Takumi Information Techonology CORPORATION, All rights reserved. What s Direct Identifier? -level1 Is it compulsory
More informationPMI2005北米大会報告書
2 3 Metro Toronto Convention Center Toronto, Canada PMI PMI SIG Meeting Paper Presentation PM PM PMI 4 5 8-15 Sep. 2005, Metro Toronto Convention Center, Toronto, Canada 6 7 CEO PM 180,000 PMI BMW PMI
More informationCopyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen
SATO Label Gallery SATO International Pte Ltd Version : BSI-021227-01 Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work
More information08_中嶋真美.indd
56 2015 pp. 175 190 CBT CBT CBT UNWTO 2015 2013 10 2015 11 3,300 2010 2030 3.3 2030 182014 1 2,450 GDP 9 2016 1 30 175 56 UNESCO 2010 Living Heritage Cultural Landscape Community-Based Tourism 2002UNWTO
More information企業内システムにおけるA j a x 技術の利用
Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More information2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...
More informationITSM.PDF
HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed
More informationunix.dvi
1 UNIX 1999 4 27 1 UNIX? 2 1.1 Windows/Macintosh? : : : : : : : : : : : : : : : : : : : : : : : : 2 1.2 UNIX OS : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 1.3 : : : : : : : : : : : :
More informationデフレの定義(最新版).PDF
DP/01-1 Director General for Economic Assessment and Policy Analysis CABINET OFFICE E-mail : naoki.okamoto@mfs.cao.go.jp 1 2 3 i (ii) 4 5 Deflation defined as at least two consecutive years of price decreases.
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationuntitled
2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,
More informationPhonetic Perception and Phonemic Percepition
No.7, 587-598 (2006) The Historical and Social Significance of Foreign Brides in the Uonuma Region of Niigata Prefecture (1) TAKEDA Satoko Nihon University, Graduate School of Social and Cultural Studies
More informationL3 Japanese (90570) 2008
90570-CDT-08-L3Japanese page 1 of 15 NCEA LEVEL 3: Japanese CD TRANSCRIPT 2008 90570: Listen to and understand complex spoken Japanese in less familiar contexts New Zealand Qualifications Authority: NCEA
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information5005-toku3.indd
3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG
More informationWeb-ATMによる店舗向けトータルATMサービス
Web- Total Service for Stores by Web- 土田敬之 阿久津和弘 山本耕司 高木晋作 川端正吾 幾見典計 あらまし Automated Teller Machine 2002 2004 Web- 2013 3 5 4400 Web- Abstract Automated teller machines (s) for financial institutions have
More information日本看護管理学会誌15-2
The Journal of the Japan Academy of Nursing Administration and Policies Vol. 15, No. 2, PP 135-146, 2011 Differences between Expectations and Experiences of Experienced Nurses Entering a New Work Environment
More informationø ø Lessons Learned from the Worldwide Spread of Evidence-Based Medicine (EBM) Abstract Keywords Evidence-based Policies in Education: New Directions and Issues Abstract Keywords Contribution
More information(group A) (group B) PLE(Primary Leaving Examination) adobe Flash ipad 1 adobe Flash e-book ipad adobe Flash adobe Flash Pixton scratch PLE(Primary Lea
2012 Future University Hakodate 2012 System Information Science Practice Group Report Project Name Anime de Education Group Name Science Group /Project No. 1-B /Project Leader 1010071 Ayaka Saitou /Group
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More information<4D F736F F D20D2E5E7E8F1FB E3EEE45FE8F1EFF0>
13 1 71 71 71 71 7 1 7 1 7 1 7 1 71 71 71 71 71 71 7 (1 71 71 71 7 1 71 7) 1 7 1 71 71 71 71 71 71 7 1 71 7 1 7 1 71 71 71 71 7 1 71 71 71 71 71 71 71 7 1 71 71 71 71 7, 1 71 71 71 71 71 71 7 1 7 1 71
More information4 23 4 Author s E-mail Address: kyamauchi@shoin.ac.jp; ksakui@shoin.ac.jp Japanese Elementary School Teachers Four Skills English Ability: A Self-evaluation Analysis YAMAUCHI Keiko, SAKUI Keiko Faculty
More information評論・社会科学 90号(よこ)(P)/4.咸
1 2008 7 1 1 4 5 1 1998 2003 2005 3 2 2008 7 1 2009 7 30 2009 11 18 2009 2009 2008 1 1 1 1 65 1970 3.1 2000 7.2 7 2008 10.7 14 2018 1 2 1985 41.92008 50.0 2004 15 59 2003 2010 79 2020 114 OECD 1 65 2006
More information25 201002666 1 4 1.1................................... 4 1.2.................................. 5 1.3............................... 5 1.3.1 RBAC................. 5 2 7 2.1..............................
More information116,/ / - /-, /1 /2 0 / ,, / 3 ing / , 2, 3, , 3,,. ISO. /.. 0 -,. ISO., 0-
115, -, 320 3, -,0, 0, 222,/3- Conjoint 3.., 1,/-0... 0 - Analysis 1, 1/3./. 3 / /-, - 0-,.- ha, /. 1 116,/ / - /-, /1 /2 0 / 0- - 0 2,, / 3 ing - 0. - / - - 0 -. 1 -, 2, 3, - - 3 3 31, 3,,. ISO. /.. 0
More information07_伊藤由香_様.indd
A 1 A A 4 1 85 14 A 2 2006 A B 2 A 3 4 86 3 4 2 1 87 14 1 1 A 2010 2010 3 5 2 1 15 1 15 20 2010 88 2 3 5 2 1 2010 14 2011 15 4 1 3 1 3 15 3 16 3 1 6 COP10 89 14 4 1 7 1 2 3 4 5 1 2 3 3 5 90 4 1 3 300 5
More information60 0 0 0 (3) 1. 記 録 されたトラウマ 襲 いかかる 記 憶 2000 30
59 はじめに 2007 (1) 70 1970 (2) UTCP Uehiro Booklet, No. 2, 2013 10 pp. 59 72 60 0 0 0 (3) 1. 記 録 されたトラウマ 襲 いかかる 記 憶 2000 30 61 0 0 0 0 0 0 0 0 ( 2007a: 165) ( 2007a: 165) 62 ( 2007a: 170) 0 0 0 GI 0 GI (
More information) ,
Vol. 2, 1 17, 2013 1986 A study about the development of the basic policy in the field of reform of China s sports system 1986 HaoWen Wu Abstract: This study focuses on the development of the basic policy
More information(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
/ 1995 Grid Access Model 1. (1) 22 1998 12 11 2000-1- (2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
More informationAppropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati
Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Education of Disaster Preparedness System and Class Practice
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More information