new-trusted-os3.PDF
|
|
- なごみ ゆきしげ
- 5 years ago
- Views:
Transcription
1 security 101 Identity Management Provisioning IPA 2002 Slide 1 security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model Identity Management Provisioning Slide 2 Copyright 2001,2002 HP Page 1
2 1986 () International R&D 1990 () ( ) ( ( ( ( ( SC 27/WG 1 ( ( Slide 3 Slide 4 Copyright 2001,2002 HP Page 2
3 DMZ 1 2 TCSEC-BLS, CMWEC 3 Slide 5 OpenHack 2 (Y2000) OpenHack 3 (Y2001) Slide 6 Copyright 2001,2002 HP Page 3
4 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 7 subject access object Slide 8 Copyright 2001,2002 HP Page 4
5 illegal access unauthorized access abuse of authorized access (anomaly detection) Slide 9 CIA C Slide 10 Copyright 2001,2002 HP Page 5
6 CLASSIFICATION DESIGN CLASSIFICATION MODEL clearances sensitivity levels + compartments markings - (worst practice: floating label) HOW TO BE HANDLED (not based on attribute) CRITERIA TO CLASSIFY when? at creation (concern about 1:N) who? by creator (concern about 1:N) what? Just Enough (is better than Baseline) Slide 11 Step 1.4 Classification (Level, Compartment & Marking) Slide 12 Copyright 2001,2002 HP Page 6
7 security strength depends on audit enforced by integrity ex) WRITE UP makes containment against abuse of authorization / Slide 13 CLASSIFICATION AUTHENTICATION ACCESS CONTROL INFORMATION FLOW CONTROL LEAST PRIVILEGE AUTHORIZATION (DUAL LOCK) AUDITING covert channel Audit Trail Slide 14 Copyright 2001,2002 HP Page 7
8 sysadmin DUAL LOCKED AUTHORIZATION i.s. system officer (sysadmin ) ( ) (isso ) (user) (owner) (custodian) (guardian) Slide 15 Slide 16 Copyright 2001,2002 HP Page 8
9 Step 4.1 awareness Step 4.2 education Step 4.3 training Slide 17 proactive PREVENTION PROTECTION penetration detection REACTION X X x x plan incident REPORT in advance reactive improve X X * trap (pitfall on the term REACTION ) Slide 18 Copyright 2001,2002 HP Page 9
10 ISO/IEC (JIS X5070) TOE - Target of Evaluation - PP - Protection Profile - ST - Security Target - EAL - Evaluation Assurance Level EAL Slide 19 ISO/IEC JIS X 5070 CC V2.1 CCRA Slide 20 Copyright 2001,2002 HP Page 10
11 Partnership with ISO Common Criteria development group made significant effort to get criteria adopted as an international standard (ISO/IEC 15408) Need to maintain regular and consistent coordination/liaison with ISO SC 27 Working Group 3 but this effort requires resources which tend to be limited : CCRA History, Implementation, Future E`xpansion, and International Experiences Dr. Stuart Katzke / National Institute of Standards and Technology Slide 21 : Future Directions of the Common Criteria (CC) and the Common Evaluation Methodology (CEM) Dr. Stuart Katzke / National Institute of Standards and Technology Slide 22 No new versions until April 2003 (at the earliest) Request for Interpretations (as of February 2002) 206 Total Requests for Interpretation Final interpretation is a change to the CC/CEM 16 months average time to process Labor intensive: requires significant preparation/coordination Limited resources Requires unanimous consent Copyright 2001,2002 HP Page 11
12 Bell-La Padula Slide 23 Bell-La Padula hp secure linux Slide 24 Copyright 2001,2002 HP Page 12
13 SYSTEM HIGH DB Internet eth0 Web eth1 intranet Mail System Slide 25 HT * -> COMPARTMENT web PORT 80 METHOD tcp NETDEV lan_eth0 COMPARTMENT web -> COMPARTMENT tomcat1 PORT 8007 METHOD tcp NETDEV lan_lo COMPARTMENT web -> COMPARTMENT tomcat2 PORT 8008 METHOD tcp NETDEV lan_lo COMPARTMENT tomcat1 -> HT server1 PORT 8080 METHOD tcp NETDEV lan_eth1 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 26 Copyright 2001,2002 HP Page 13
14 web /compt/web read active web /compt/web/tmp read,write active web /compt/web/apache/logs append active web / none active Slide 27 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 28 Copyright 2001,2002 HP Page 14
15 hp secure linux # ls -ln -rw-r--r Nov 16 04:45 access.conf -rw-r--r Nov 16 04:45 httpd.conf -rw-r--r Nov 16 04:45 mime.types -rw-r--r Nov 16 04:45 srm.conf -rwxrwxrwx Dec 24 23:32 openfile # echo abc > httpd.conf sh: httpd.conf: Operation not permitted # who root tty1 Dec 25 03:10 # echo abc >> openfile sh: openfile: Operation not permitted # rm access.conf rm: cannot unlink access.conf : Operation not # Slide 29 Bell-La Padula hp secure linux ppt PDF Slide 30 Copyright 2001,2002 HP Page 15
16 Bell-La Padula SYSTEM HIGH tomcat1 Internet eth0 Web tomcat2 eth1 intranet System server1 Slide 31 Bell-La Padula Bell-La Padula Slide 32 Copyright 2001,2002 HP Page 16
17 BLS 5A Authentication Access Control Authorization Authentication Authorization Administration Auditing Assurance User authentication Terminal/Client/Device authentication Server authentication Slide 33 Slide 34 Copyright 2001,2002 HP Page 17
18 subject access object Slide 35 A Slide 36 Copyright 2001,2002 HP Page 18
19 Military grade C I A Military C I A (A) Slide 37 Identity Management ID Provisioning Slide 38 Copyright 2001,2002 HP Page 19
20 Slide 39 Word from MORPHEUS / Slide 40 Copyright 2001,2002 HP Page 20
new-trusted-os.PDF
security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model 2002 Slide 1 1986 ( ) International R&D 1990 ( ) 1993 2 1996 1997
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationuntitled
TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c
More informationCIA+
ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More informationuntitled
TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More informationInformation Security Management System ISMS Copyright JIPDEC ISMS,
ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationuntitled
17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology
More informationInformation Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
More informationA B C B C ICT ICT ITC ICT
ICT Development of curriculum for improving of teachers ICT based on evaluation standards. Kazuhiko ISHIHARA Abstract Ministry of Education and Science announced Checklist of teacher s ICT in March,. All
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information評論・社会科学 84号(よこ)(P)/3.金子
1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix
More informationJIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More information.N..
Examination of the lecture by the questionnaire of class evaluation -Analysis and proposal of result at the first term of fiscal year - Kazuo MORI, Tukasa FUKUSHIMA, Michio TAKEUCHI, Norihiro UMEDA, Katuya
More informationrzamhpdf.ps
IBM i 7.2 IBM i 7.2 43 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Security Service Tools 1 2014.4 Copyright IBM Corporation 2003, 2013. .............. 1 IBM i 7.2............ 1 PDF.........
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More informationISMSクラウドセキュリティ認証の概要
Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015
More information2
2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationuntitled
DCMI nagamori@slis.tsukuba.ac.jp DCMI Metadata Schema Registry DCMI Dublin Core Metadata Initiative authoritative source 2004/10/29 2 1 Metadata is the information and documentation which makes data understandable
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More informationOracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
More informationFrequently Asked Questions (FAQ) About Sunsetting the SW-CMMR
SW-CMM FAQ(Frequently Asked Questions) SEI Frequently Asked Questions (FAQ) About Sunsetting the SW-CMM The SEI Continues Its Commitment to CMMI SEI SEI SEI PDF WWW norimatsu@np-lab.com 2002/11/27 SEI
More informationV ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE
V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationST作成の手引
7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria
More informationYUHO
-1- -2- -3- -4- -5- -6- -7- -8- -9- -10- -11- -12- -13- -14- -15- -16- -17- -18- -19- -20- -21- -22- -23- -24- -25- -26- -27- -28- -29- -30- -31- -32- -33- -34- -35- -36- -37- -38- -39- -40- -41- -42-
More informationMRI | 所報 | 分権経営の進展下におけるグループ・マネジメント
JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 E-mailprd@mri.co.jp 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,
More information2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information212013pp. 1 13 2 1 4 1980 1987 74.91997 70.12007 2014 1 31 1 64.4201161.8 1 2 3 1 3 2 4 3 2006 5 1 2 6 2 25.6 7 23.11 4.1 3.4 2 12.4 9.7 3.8 5.9 50.0 81.8 75.060.0 95.070.0 65.0 25.6 23.1 4.1 3.4 2006
More information日本国憲法における「社会福祉」
No.22 2001 11 Abstract The usage of the term social welfare started after the World War II in Japan, in article 25 of the Constitution enacted in 1946. The term appeared while the Diet was debating on
More informationシステム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~
HCDUX Approach of Applying Design Technology to System Development Process: From HCD to UX Design 善方日出夫 小川俊雄 あらまし HCDHuman Centered Design SE SDEMHCDUIUser Interface RIARich Internet ApplicationUXUser
More information12 13 ( (C)(2))
12 13 ( (C)(2)) 1 ,,,,,, 2 [1] 97 2000.9pp.35-52 [2] 98 2001.3pp.21-38 [1] K. Asai, "Recurrent Education in Teacher Education: The Japan Experience", Conference Program International Conference on Teacher
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationA5 PDF.pwd
Kwansei Gakuin University Rep Title Author(s) 家 族 にとっての 労 働 法 制 のあり 方 : 子 どもにとっての 親 の 非 正 規 労 働 を 中 心 に Hasegawa, Junko, 長 谷 川, 淳 子 Citation 法 と 政 治, 65(3): 193(825)-236(868) Issue Date 2014-11-30 URL
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationスライド 1
Asian Inter-regional Professional Securities Market 200761 NIRA 20006 2002/6 2006/5 2009/1 2003/4 CP 2006/1 2007/1 2004/5 DVP 9/11 T+1 T+3 Customer First, Information Technology, Global Standard, Contestability
More information[2] 1. 2. 2 2. 1, [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7
32 (2015 ) [2] Projects of the short term increase at present. In order to let projects complete without rework and delays, it is important that request for proposals (RFP) are written by reflecting precisely
More information産業構造におけるスポーツ産業の範囲に関する研究Ⅰ
Abstract This study is emphasizes that the sports industry holds big weight with the economy of our country but tends to be disregarded The study sees it us a peculiar industry which has ports of both
More information5005-toku3.indd
3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG
More information,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki
More informationITSM.PDF
HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed
More informationスライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
More information2 94
32 2008 pp. 93 106 1 Received October 30, 2008 The purpose of this study is to examine the effects of aerobics training class on weight loss for female students in HOKURIKU UNIVERSITY. Seventy four female
More informationBull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching
Bull. of Nippon Sport Sci. Univ. 47 (1) 45 70 2017 Devising musical expression in teaching methods for elementary music An attempt at shared teaching materials for singing and arrangements for piano accompaniment
More information研究レポート表紙.PDF
No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000
More informationSystemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows
Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows Systemwalker IT Service Management Systemwalker Centric Manager IT Service
More information第33回鋼構造基礎講座 鋼橋の架設および解体撤去工法-より一層の安全性と品質の向上に向けて-
1 2 600000 500000 400000 300000 200000 117910 100000 15058 0 33343536373839404142434445464748495051525354555657585960616263 2 3 4 5 6 7 8 9 10111213141516171819202122232425262728 3 140000 200 120000 100000
More information1 基本的考え方
... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.
More informationVol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus
Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa
More informationuntitled
1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness
More informationBuilding a Culture of Self- Access Learning at a Japanese University An Action Research Project Clair Taylor Gerald Talandis Jr. Michael Stout Keiko Omura Problem Action Research English Central Spring,
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationPMI2005北米大会報告書
2 3 Metro Toronto Convention Center Toronto, Canada PMI PMI SIG Meeting Paper Presentation PM PM PMI 4 5 8-15 Sep. 2005, Metro Toronto Convention Center, Toronto, Canada 6 7 CEO PM 180,000 PMI BMW PMI
More information日本看護管理学会誌15-2
The Journal of the Japan Academy of Nursing Administration and Policies Vol. 15, No. 2, PP 135-146, 2011 Differences between Expectations and Experiences of Experienced Nurses Entering a New Work Environment
More informationMicrosoft PowerPoint - #07 Quiz Are you still with me .pptx
Quiz: Are You Still With Me? Takumi Information Technology Maiko Akutagawa Copyright Takumi Information Techonology CORPORATION, All rights reserved. What s Direct Identifier? -level1 Is it compulsory
More information08_中嶋真美.indd
56 2015 pp. 175 190 CBT CBT CBT UNWTO 2015 2013 10 2015 11 3,300 2010 2030 3.3 2030 182014 1 2,450 GDP 9 2016 1 30 175 56 UNESCO 2010 Living Heritage Cultural Landscape Community-Based Tourism 2002UNWTO
More informationMarch IT PR March March p p p PR March Vol. March p p p SN March SN PR PR March Potential Needs of Specialized Foster Parents for Abused Children: Analyzinga questionnaire survey on foster parents needs
More informationDill,, pp. - - EU i - - i - - - COE - COE COE COE Good Practice GP GP GP GP JABEE INQAAHE PDCA Plan-Do-Check-Action - FD FD - - Rice,, p. niche - i - -Jones,, pp. - MCAT - - - - - - - - - - - - - -
More information2 Web Security for the Enterprise
The Web Security Authority. Web Security for the Enterprise: How to increase protection against port 80 threats White Paper 2 Web Security for the Enterprise How to increase protection against port 80
More information<4D F736F F D20D2E5E7E8F1FB E3EEE45FE8F1EFF0>
13 1 71 71 71 71 7 1 7 1 7 1 7 1 71 71 71 71 71 71 7 (1 71 71 71 7 1 71 7) 1 7 1 71 71 71 71 71 71 7 1 71 7 1 7 1 71 71 71 71 7 1 71 71 71 71 71 71 71 7 1 71 71 71 71 7, 1 71 71 71 71 71 71 7 1 7 1 71
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information116,/ / - /-, /1 /2 0 / ,, / 3 ing / , 2, 3, , 3,,. ISO. /.. 0 -,. ISO., 0-
115, -, 320 3, -,0, 0, 222,/3- Conjoint 3.., 1,/-0... 0 - Analysis 1, 1/3./. 3 / /-, - 0-,.- ha, /. 1 116,/ / - /-, /1 /2 0 / 0- - 0 2,, / 3 ing - 0. - / - - 0 -. 1 -, 2, 3, - - 3 3 31, 3,,. ISO. /.. 0
More information25 201002666 1 4 1.1................................... 4 1.2.................................. 5 1.3............................... 5 1.3.1 RBAC................. 5 2 7 2.1..............................
More informationFA FA FA FA FA 5 FA FA 9
30 29 31 1993 2004 The process of the labor negotiations of Japan Professional Baseball Players Association, 1993 2004 ABE Takeru Graduate School of Social Science, Hitotsubashi University Abstract The
More informationuntitled
c 816 Web 1. 30 [1] [2] [3, 4] [5] 10 [6] 185 8540 2 8 38 [5] [5, 7] [5] 3 (1) 608 18 Copyright c by ORSJ. Unauthorized reproduction of this article is prohibited. (2) (3) 2. 2.1 Web 2014 1 2013 12 2.2
More information1994 2002 2002 * 1 e CD-ROM e e e 3 e e e CD-ROM DVD CBT(Computer Based Training) e 2002 e e electronic( ) WBT Web Based Training on-demand IT e e 1 y
e e Principles for the Development of E-learning Courses and a Progress Report describing the Creation of an E-learning Course in Japanese Writing Practice for Intermediate and Advanced Students e e e
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More information日本感性工学会論文誌
Vol.13 No.2 pp.391-402 2014 PROGRESS Consideration of the Transition in Mitsubishi Electric Corporate Website Design Transition in Response to Environmental Change and Record through the Case of Corporate
More information(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
/ 1995 Grid Access Model 1. (1) 22 1998 12 11 2000-1- (2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
More informationCopyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work of the Independen
SATO Label Gallery SATO International Pte Ltd Version : BSI-021227-01 Copyright 2002-2003 SATO International All rights reserved. http://www.satoworldwide.com/ This software is based in part on the work
More informationR76/Gaia ブリッジ構成設定ガイド
R76/GAiA ブリッジ構成設定ガイド ( スタンドアロン構成 ) Last updated Aug 16, 2013 Ver 1.0 はじめに 本章の手順は 以下の項目が満たされている事を前提条件としています 事前に GAiA R76 のインストールが完了していること 管理コンソールに SmartConsole がインストールされていること 対象となるアプライアンス機器は Model 2200
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More information企業内システムにおけるA j a x 技術の利用
Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet
More information15717 16329 2
2 161012 1 15717 16329 2 3 4 5 1980 55 1991 16 6 m 1.32m/0.88m 35m 1.32m 0.88m 0.88m 27m 1.5m 2.1m/1.32m 10.9m 10.9m 16m 12m 7 km 1km 1,000km 3km( 9 km 1,000km ( 1,000km 300km 6 10 250kg500kg 200 1t B291
More informationデフレの定義(最新版).PDF
DP/01-1 Director General for Economic Assessment and Policy Analysis CABINET OFFICE E-mail : naoki.okamoto@mfs.cao.go.jp 1 2 3 i (ii) 4 5 Deflation defined as at least two consecutive years of price decreases.
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationPhonetic Perception and Phonemic Percepition
No.7, 587-598 (2006) The Historical and Social Significance of Foreign Brides in the Uonuma Region of Niigata Prefecture (1) TAKEDA Satoko Nihon University, Graduate School of Social and Cultural Studies
More informationL3 Japanese (90570) 2008
90570-CDT-08-L3Japanese page 1 of 15 NCEA LEVEL 3: Japanese CD TRANSCRIPT 2008 90570: Listen to and understand complex spoken Japanese in less familiar contexts New Zealand Qualifications Authority: NCEA
More informationOracle Application Server 10g( )インストール手順書
Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25
More informationsp c-final
NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation
More informationIntroduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool
Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool for developing software for embedded systems that
More informationø ø Lessons Learned from the Worldwide Spread of Evidence-Based Medicine (EBM) Abstract Keywords Evidence-based Policies in Education: New Directions and Issues Abstract Keywords Contribution
More information(group A) (group B) PLE(Primary Leaving Examination) adobe Flash ipad 1 adobe Flash e-book ipad adobe Flash adobe Flash Pixton scratch PLE(Primary Lea
2012 Future University Hakodate 2012 System Information Science Practice Group Report Project Name Anime de Education Group Name Science Group /Project No. 1-B /Project Leader 1010071 Ayaka Saitou /Group
More informationOJT Planned Happenstance
OJT Planned Happenstance G H J K L M N O P Q R . %. %. %. %. %. %. %. %. %. %. %. %. %. %. %. %. %. %. .... Q ......... . Planned Happenstance.. pp.- VOL.,NO. pp., Current Status of Ritsumeikan Employees
More informationTaro12-認定-部門-ASG101-06
JIS Q 17025(ISO/IEC 17025(IDT)) JIS Q17025(ISO/IEC 17025(IDT)) --- --- JNLA JCSS ISO/IEC 17025 JIS Q 17025 IAJapan ILAC APLAC JIS Q17011 ISO/IEC 17011 MRA ILACAPLAC MRA IAJapan (3) JNLAJCSS (4) testing
More information07九州工業大学.indd
1 1 Journal of Multimedia Aided Education Research, 2004, No. 1, 45 58 e-learning e-learning e-learning Video On Demand e-learning e-learning e-learning e-learning 2004 e-learning e-learning OLU SCS 2
More informationetrust Access Control etrust Access Control UNIX(Linux, Windows) 2
etrust Access Control etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control 3 ID 10 ID SU ID root 4 OS OS 2 aaa 3 5 TCP/IP outgoing incoming DMZ 6 OS setuid/setgid) OS
More information