Vol.55 No (Mar. 2014) 1,a) , SAML/ID-WSF ID-WSF A Proposal and an Evaluation of Technology on Federated Identity and

Size: px
Start display at page:

Download "Vol.55 No (Mar. 2014) 1,a) , SAML/ID-WSF ID-WSF A Proposal and an Evaluation of Technology on Federated Identity and"

Transcription

1 1,a) , SAML/ID-WSF ID-WSF A Proposal and an Evaluation of Technology on Federated Identity and Usage of Attributes in Cloud Computing Takashi Shitamichi 1,a) Ryoichi Sasaki 1 Received: March 25, 2013, Accepted: December 4, 2013 Abstract: Federated services among multi-domain network are expected to be widely deployed onto cloud computing environment. Technology not only for federated identity but also services using distributed attributes, that are not only static but also dynamic, are required. Focusing on SAML and ID-WSF, that are technology for identity management and services with privacy, this paper discusses deployments and problem of them in the real world to extend ID-WSF, proposes adaptable, fast and safe technology which can safely use attributes, and evaluates the effectiveness of the proposed technology. Keywords: identity, cloud computing, federation 1. SAML Security Assertion Markup Language [1] OpenID [2], OAuth [3] 1 Tokyo Denki University, Adachi, Tokyo , Japan a) takashi.shitamichi@private. .ne.jp Federated Identity [4] SAML SAML Shibboleth [5] SAML Liberty Alliance ID-WSF Identity Web Service Framework [6] SAML c 2014 Information Processing Society of Japan 1186

2 static attribute dynamic attribute [7] Facebook Twitter API [8] SSO [9] LAN SSO [10] [11] [12] Web RTT: Round Trip Time SAML/ID-WSF ID-WSF Web SAML ID-WSF SAML ID-WSF SAML ID-WSF 2.1 SAML SAML SSO: Single Sign On 2000 SAML IdP: Identity Provider STS: Security Token Service SP: Service Provider SP IdP IdP SAML SAML XML SAML SSO 1 Web UA User Agent SSO 1 ID c 2014 Information Processing Society of Japan 1187

3 1 SAML Fig. 1 Identity federation using SAML. 3 SAML Fig. 3 Structure of SAML token. 2 Liberty Alliance Fig. 2 Framework of Liberty Alliance specification. SAML SSO Web SSO 3 [13] (1) SP-initiated SSO: Redirect/POST Bindings (2) SP-Initiated SSO: POST/Artifact Bindings (3) IdP-Initiated SSO: POST Binding SSL/TLS SAML Web SOAP Simple Object Access Protocol SAML (2) *1 2.2 ID-WSF ID-WSF Web Liberty Alliance SAML ID-WSF 2 ID-WSF SOAP *1 SSL/TLS [14], [15] SSL/TLS SOAP [16] 4 ID-WSF Fig. 4 Message flow of ID-WSF. ID 3 SAML [17] XML IdP ID-WSF 4 SOAP ID-WSF OpenID REST Representational State Transfer SOAP WS-* c 2014 Information Processing Society of Japan 1188

4 SOAP ID-WSF WSP Web Service Provider WSP URL DS Discovery Service WSC Web Service Consumer DS WSC WSC WSP URL DS WSC WSP WSP WSC 2 IS: Interaction Service /ID-WSF ID-WSF AOL Radio@AOL ID-WSF [18] Nokia ID-WSF SOA [19], [20] [21], [22], [23], [24], [25] ID-WSF [26], [27] 3. SAML SSO SAML SSO POST/Artifact Bindings 3.1 AWS Amazon Web Service 7 IaaS Amazon EC2 Elastic Computing Cloud 1 PC AWS EC2 RTT msec () hop Table 1 RTT between client PC and each AWS EC2 regions (msec, (): number of hops). (1) AWS EC2 PC AWS EC2 OS/Middleware Fedora bit/jdk1.6 Tomcat6 OpenAM9.5.3 Small 1.7 GB memory 1 EC2 Compute Unit 160 GB storage IP 14 Elastic IP PC OS Mac OS X Web Firefox Wired 100 Mbps (2) 7 IdP SP 14 SAML SSO SAML SSO Web IdP SP RTT PC RTT traceroute (3) 1 PC RTT ms ms 30 RTT / ms RTT / ms 20 c 2014 Information Processing Society of Japan 1189

5 2 IdP/SP Table 2 Duration between IdP and SP. 5 SAML SSO POST/Artifact Bindings Fig. 5 Sequence of SAML SSO POST/Artifact Bindings. RTT 1msec 3.2 AWS EC2 SAML SSO (1) (2) SAML SP-Initiated SSO POST/Artifact Bindings AWS EC2 7 IdP SP tshark 5 t1 t24 24 T 1 =SP IdP T 2 = SP T u = SP T T = T 1 + T u + T 2 T u T s T s = T 1 + T 2 T s T s (3) IdP/SP 2 T 1 / 989 msec T 2 / 1,929 msec T s / 2,540 msec T 1 T 2 T s / 63 msec 199 msec 262 msec T s / 2,540 msec / 262 msec 10 T 1 1 T 2 2 T 2 / / 3 5 S 8 S 9 IdP/SP SOAP 3 t14 t19 Δ Δt15 = 468 msec Δt16 = 294 msec Δt17 = 3 msec TCP/IP Δt15 [SYN] [SYN, ACK] [SYN] TCP/IP Δt16 POST [ACK] IdP S8 Artifact Response S8 c 2014 Information Processing Society of Japan 1190

6 3 T1 T2 Table 3 Duration of T1 and T2. Idp Δt17 3msec SOAP 3.3 SAML ID-WSF [28], [29] (1) 4 ID-WSF WSC WSP *2 ID-WSF WSC WSP WSC WSP *2 Web 3 47% 2 Web Web 3 40% [31] ID-WSF (2) [30] ID-WSF *3 4. ID-WSF 2 RTT ID-WSF WSC (1) (a) WSP WSPs WSPd A B *3 Liberty Geo Location Service [32] c 2014 Information Processing Society of Japan 1191

7 ID-SIS Personal Profile id-sis-pp <DyamicAttributes> id-sis-pp XML 6 Fig. 6 Message flow of dynamic attributes roaming. (b) WSPd WSC WSPr WSC WSPd HTTP (a) (b) 6 (2) WSC ID-WSF ID-SIS id-sis-wps id-sis-wpd id-sis-wpr 3 id-sis-wps (3) WSC WSPr 6 () 1 WSPd DS dd1 WSC WSPs id-sis-wps <DynamicAttributes> id-siswpd WSC DS WSPd 2 DS dd2 WSC c 2014 Information Processing Society of Japan 1192

8 3 WSPd pd1 ResourceID WSC WSPd 8 WSPr WSPd cd1 WSPr BulkRequest WSPd 4 WSPd pd2 WSPd 9 WSPd WSPr cd2 WSPd WSPr 5 WSPr DS dr1 WSPd roam WSC ServiceType id-sis-wpr DS WSPr 6 DS dr2 DS WSPr ResourceID 10 pr1 WSC WSC WSPr WSPd UA WSPr WSPd (4) WSPr pr1 WSPd WSPr WSC WSPr 4.2 SOAP 1 1 RTT RTT (1) WSPr n WSPd n c 2014 Information Processing Society of Japan 1193

9 Fig. 7 7 Sequence of dynamic attributes roaming method. Fig. 9 9 System flow of parallel transfer of batched dynamic attributes. 8 Fig. 8 Comparison with transfer methods. n HTTP SOAP n SOAP (2) SOAP SSL SOAP XML XML SOAP XML (3) 8 (a) HTTP GET (b) HTTP GET (c) 1 (4) C 9 S1 WSPr CP n fork() S2 CP HTTP GET WSPd n b n S3 WSPd httpd CGI S4 CP HTTP GET httpd CGI n c 2014 Information Processing Society of Japan 1194

10 S5 n S6 HTTP SOAP CP S7 CP SOAP b n S8 CP WSPr 4 RTT sec / Table 4 Comparison of RTT in each method and effectiveness (msec, effectiveness: non-roaming/roaming) XML (a) (b) (a) WSC (b) WSPd WSPr n n n (a) 5.1 (1) 7 3 (Ts1,Ts2) (Td1,Td2) (Tr) WSC S8 S9 n S8 S9 / td1/td2 td3/td4 tdp 1 Td1 RTT Tdt Tdt = = n (Td1)i = i=1 n (ΔS8+ΔS9+tdp)i i=1 n ((td2 td1) + (td4 td3) + (td3 td2))i i=1 RTT Trt Trt = 17 i=12 ΔSi + 5 (trp)i i=1 =(tr2 tr1) + (tr3 tr2) + +(tr12 tr11) Tdt Trt AWS EC2 (2) AWS EC2 WSC WSPd WSPr DS/IdP C AWS EC2 1GB mem CentOS5.7 Apache 2.2 MySQL5.1 1,024 2,048 8,192 16,384 byte C (3) 4 N N =1 10, 20, 50, 100, 200, 500, 1,000 RTT Trt RTT Tdt WSC WSPd 10 (4) 8,192 byte 4 10 / / c 2014 Information Processing Society of Japan 1195

11 10 N =1 10 RTT Fig. 10 Comparison of RTT with each methoed from N =1 to 10. RTT RTT RTT WSC WSPd RTT N =1,000 WSC WSPd RTT N N = 100 N >100 N =3 > 1 N =20/ / 1 N N 1 N =1,000 8,192 1,000=8 MB RTT N =10 10 (5) / 100 RTT 2.79 / 11 M Fig. 11 Comparison of transfer time at multiplicity M. RTT RTT 5.2 (1) 1 WSPd SOAP WSPr AWS EC2 (2) 2 AWS EC2 WSPd WSPr AWS EC2 1.7 GB mem High-CPU Medium Instance CentOS6.3 Apache 2.2 MySQL KB 256 KB 512 KB 768 KB 1,536 KB (3) WSPr WSPd M HTTP M 4.2 C 10 (4) M c 2014 Information Processing Society of Japan 1196

12 12 M Fig. 12 Comparison of transfer bandwidth at multiplicity M. vmstat OS WSPr M = 100 CPU Idle 90% WSPd M =50 CPU idle 70% M = % CPU (5) AWS EC AWS AWS AWS 13 XML Fig. 13 Comparison of processing time to attach XML signature. 5.3 (1) SSL AWS EC2 OS XML XML Security Library (2) AWS EC2 2 PC 3 AWS EC2 1.7 GB mem High-CPU Medium Instance CentOS6.3 Apache 2.2 MySQL5.5 PC Native Core i7 2.2 GHz 4 core 16 GB mem MacOS 10.7 VM Virtual Box GB mem CentOS6.3 XML Security Library xmlsec SHA256 RSA2048 XML 100 KB 500 KB 1MB 2MB 4MB 8MB (3) XML AWS EC2 2 3 XML (4) 13 XML 14 XML AWS EC2 High-CPU Medium Instance PC 20 30% c 2014 Information Processing Society of Japan 1197

13 14 XML Fig. 14 Comparison of processing time to verify XML signature. 5 Table 5 Effectiveness by each method. 1MB XML 74 msec 58 msec 2MB XML 123 msec 99 msec OS Linux MacOS CPU xmlsec MacOS Linux (5) AWS EC2 CPU PC SOAP XML 6. 5 AWS XML XML AWS XML 7. SAML/ID-WSF RTT SOAP [1] OASIS Security Services (SAML) TC, available from home.php? wg abbrev=security. [2] OpenID Authentication 2.0 Final, available from 0.html. c 2014 Information Processing Society of Japan 1198

14 [3] The OAuth 1.0 Protocol, available from ietf.org/html/rfc5849. [4] Liberty Alliance Project White Paper, available from ad/387/2720/file/liberty Federated Social Identity.pdf. [5] Internet2 Shibboleth Project, available from [6] Liberty Alliance ID-WSF 2.0 Specifications including Errata v1.0 Updates, available from projectliberty.org/resource center/specifications/liberty alliance id wsf 2 0 specifications including errata v1 0 updates/. [7] Web AI Vol.24, No.4, pp , [8] Takeda, Y., Kondo, S., Kitayama, Y., Torato, M. and Motegi, T.: Avoidance of Performance Bottlenecks Caused by HTTP Redirect in Identity Management Protocols, DIM 06, Proc. 2nd ACM Workshop on Digital Identity Management, ACM (2006). [9] Tran, T. and Wietfeld, C.: Approaches for Optimizing the Performance of a Mobile SAML-based Emergency Response System, Enterprise Distributed Object Computing Conference Workshops, EDOCW 2009, 13th, IEEE (2009). [10] Vol.47, No.3, pp (2006). [11] F-1 (2010). [12] Cuddy, S., Katchabaw, M. and Lutfiyya, H.: Context- Aware Service Selection Based on Dynamic and Static Service Attributes, Wireless And Mobile Computing, IEEE International Conference on Networking And Communications (WiMob 2005 ), Vol.4, IEEE (2005). [13] Security Assertion Markup Language (SAML) V2.0 Technical Overview, OASIS (25 Mar. 2008). [14] SSL/TLS renegotiation IPSJ SIG Notes 2010-CSEC-50(12), 1-4, (2010). [15] Heninger, N., Durumeric, Z., Wustrow, E. and Halderman, J.A.: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices, USENIX Security 12 (2012). [16] V2.5 (2012). [17] ID-WSF (2011). [18] Liberty Alliance Project XML (Sep. 2005). [19] Nokia Web Services Framework for Devices A Serviceoriented Architecture, NOKIA CORPORATION. [20] Web Services Framework API: Using the API, available from Developers Library/GUID-759FBC7F A8D4B76F6AA6/html/Web Services Framework API4. html. [21] (Sep. 2008). [22] Vol.2009-DPS-141, No.14 (2009). [23] ID IN (2010-1) (2009). [24] FIT L-035 (2010). [25] Hatakeyama, M. and Shima, S.: Privilege Federation between Different User Profiles for Service Federation, DIM 08, Proc. 4th ACM Workshop on Digital Identity Management, ACM (2008). [26] 9 2r gdlt-att/2r gdqj.pdf. [27] html. [28] Liberty Alliance Liberty ID-WSF Security Mechanisms Core, available from org/liberty/content/download/3478/23060/file/libertyidwsf-security-mechanisms-core-2.0-errata-v1.0.pdf. [29] ID-WSF 2.0 SecMech SAML Profile, available from /file/liberty-idwsf-security-mechanisms-saml-profilev2.0.pdf. [30] No.28, pp , (2010). [31] Forrester Research: ecommerce Web Site Performance Today An Updated Look At Consumer Reaction To A Poor Online Shopping Experience (Aug. 2009), available from ecommerce website perf wp.pdf. [32] Liberty ID-SIS Geolocation Service Specification, available from center/specifications/liberty alliance id sis 1 0 specifica tions/. AT&T UNIX Java API 2010 IPA Ruby ISO SC27/WG5 ISACA CISA CISM c 2014 Information Processing Society of Japan 1199

15 IT 2008 c 2014 Information Processing Society of Japan 1200

ppt

ppt XML Liberty Alliance Project 2005 9 13 Liberty Alliance SIG Co-Chair NEC 1 Liberty Alliance 2 Liberty Alliance Project Liberty Alliance Liberty 3 Liberty Alliance Project 4 Liberty

More information

untitled

untitled WEB SAML 2.0 RSA 2005 SAML 2.0 2 1 3 Federated Identity The agreements, standards, and technologies that make identity and entitlements portable across autonomous domains. The Burton Group Web 4 2 Scope

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

SAML

SAML 2003 6 2 XML Consortium SWG ( )NTT ( ) Copyright XML Consortium 2003/06/02 1 Copyright XML Consortium 2003/06/02 2 2002 2003 7 8 9 10 11 12 1 2 3 4 5 6 3/5 6/2 Copyright XML Consortium 2003/06/02 3 Copyright

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション Room D Azure Active Directory によるクラウドアプリ連携編 ~ Password Windows Intune Password Windows Intune デスクトップ PC(Windows) に対するガバナンス Azure Active Directory World SaaS Windows Server Active Directory World 業務データ

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

XMLを基盤とするビジネスプロトコルの動向

XMLを基盤とするビジネスプロトコルの動向 XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative

More information

GPGPU

GPGPU GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

Encryption Security

Encryption Security 200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a 1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the

More information

untitled

untitled SAML 2004 12 9 y-endo@ah.jp.nec.com 2. SAML SAML SAML SAML SAML SSO SAML 4. Liberty Alliance Liberty Liberty ID-FF1.2 NEC Corporation 2004 2 PKI ID NEC Corporation 2004 4 PKI ID NEC Corporation 2004 5

More information

A B, ID http:// End-User 3 How do I get an OpenID?, 4

A B, ID http:// End-User 3 How do I get an OpenID?, 4 ID - OpenID Authentication1.1) 2007 12 07 XML Day, 1 07-Dec-2007, 2 A B, ID http:// End-User 3 How do I get an OpenID?, 4 , 5, 6 ~120 million OpenID s (including every AOL and LiveJournal user), 7, 8 ,

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

1 2 3 ( ) ( ) SNS SNS Facebook %[g]( %[ ]) [ ] IT LNS (Life Networking Service) LNS LNS LNS SNS SNS 3. LNS (Life Networking S

1 2 3 ( ) ( ) SNS SNS Facebook %[g]( %[ ]) [ ] IT LNS (Life Networking Service) LNS LNS LNS SNS SNS 3. LNS (Life Networking S 情報処理学会インタラクション 2012 IPSJ Interaction 2012 2012-Interacti 2012/3/15 Life Networking Service LNS LNS twitter LNS Life Log Sharing with Life Networking Service YUSUKE NAKANO HIROSHI KAWAKAMI HIROYUKI TARUMI

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag

More information

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara 1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko

More information

untitled

untitled All rights reserved. NTT Copy rights 2007 1 HTTPS 100% 92% 53% S. Schechter et al, The Emperor's New Security Indicators, Proc. IEEE Symp. Security and Privacy, 2007 All rights reserved. NTT Copy rights

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

BIG‑IP Access Policy Manager | F5 Datasheet

BIG‑IP Access Policy Manager | F5 Datasheet 2 3 5 7 8 Secure Web Gateway 10 12 BIG-IP APM 13 F5 Global Services 13 13 BIG-IP Access Policy Manager (APM) LAN BIG-IP APM IT LAN 1 Web OAM XenApp Exchange Web Web Web Web Web web BIG-IP APM LAN IT /

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

IEEE e

IEEE e 2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S 1,a) 1 1,b) 1,c) 1,d) Interaction Design for Communication Between Older Adults and Their Families Using Channel-Oriented Interface Takeda Keigo 1,a) Ishiwata Norihiro 1 Nakano Teppei 1,b) Akabane Makoto

More information

Dec , IS p. 1/60

Dec , IS p. 1/60 Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

sp c-final

sp c-final NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

IPSJ SIG Technical Report Vol.2019-IOT-44 No /3/8 CRIU HTTP 1,a) 2 PC SNS Web FastContainer HTTP HTTP Web HTTP Web Web Low-cost and High Perfor

IPSJ SIG Technical Report Vol.2019-IOT-44 No /3/8 CRIU HTTP 1,a) 2 PC SNS Web FastContainer HTTP HTTP Web HTTP Web Web Low-cost and High Perfor CRIU HTTP 1,a) 2 PC SNS Web FastContainer HTTP HTTP Web HTTP Web Web Low-cost and High Performance Scheduling Method for Reactive Relocation of Containers Each HTTP Request Using CRIU Ryosuke Matsumoto

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of

More information

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu EVITS 1,a) 2 2 2011 10 21, 2012 4 2 EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Communication System for Electric Vehicle Yuriko Hattori 1,a) Tomokazu Shimoda 2 Masayoshi

More information

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

IP IP DHCP..

IP IP DHCP.. NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support 1,a) 1 1 2015 6 22, 2015 12 7 L3 CG 50 600 VDI VDI A Migration to a Cloud-based Information Infrastructure to Support University Education and It s Analysis Kaori Maeda 1,a) Nobuo Suematsu 1 Toshiaki Kitamura

More information

6_27.dvi

6_27.dvi Vol. 49 No. 6 1932 1941 (June 2008) RFID 1 2 RFID RFID RFID 13.56 MHz RFID A Experimental Study for Measuring Human Activities in A Bathroom Using RFID Ryo Onishi 1 and Shigeyuki Hirai 2 A bathroom is

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [ 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)

More information

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou 情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these

More information

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i 21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

All Rights Reserved, Copyright FUJITSU LIMITED. 2004 3 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 4

All Rights Reserved, Copyright FUJITSU LIMITED. 2004 3 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 4 2004129 1 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 2 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 3 All Rights Reserved, Copyright

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi

More information

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo 1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS HPCI 1 2 3 4 5 1, 6 5 24 HPCI HPC OS HPC RENKEI-PoP Design of Advanced Software Deployment Infrastructure in HPCI Wide-area Distributed Environment Shinichiro Takizawa, 1 Masaharu Munetomo, 2 Atsuya Uno,

More information

1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web )

1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web ) Vol. 52 No. 3 1033 1044 (Mar. 2011) IME 1 2 1 1 IME Web PC Android Dynamic Dictionary Generation Method for Context-aware Input Method Editor Yutaka Arakawa, 1 Shinji Suematsu, 2 Shigeaki Tagashira 1 and

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

0401489‐工芸‐医用画像22‐1/12[論文]柳田

0401489‐工芸‐医用画像22‐1/12[論文]柳田 364-8501 6-100 321-3292 20-2 XR 277-0804 2-1 2004 10 3 2004 12 6 Effectiveness of Mobile Flat Panel Detector system Satoshi YANAGITA, Masako HITACHI, Tomoyuki SAKURAI, Yoshihiro SUZAKI, Takashi OGURA Eiji

More information

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat AUTOSAR 1 1, 2 2 2 AUTOSAR AUTOSAR 3 2 2 41% 29% An Extension of AUTOSAR Communication Layers for Multicore Systems Toshiyuki Ichiba, 1 Hiroaki Takada, 1, 2 Shinya Honda 2 and Ryo Kurachi 2 AUTOSAR, a

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS Single Sign On (Hisashi NAITO) naito@math.nagoya-u.ac.jp Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp, Oct. 19, 2005 Tohoku Univ. p. 1/40 Plan of Talk CAS CAS 2 CAS Single

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

Oracle Application Server 10g( )インストール手順書

Oracle Application Server 10g( )インストール手順書 Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25

More information

2009 NTT Corporation. All rights reserved.

2009 NTT Corporation. All rights reserved. 2009 NTT Corporation. All rights reserved. SAML2.0 (X.1141) HITSP ITU-T 3GPP ISO OMA ETSI UPKI ISOC OpenID Foundation Concordia Project OATH Bandit OSIS OASIS Higgins OpenSSO Information Card Foundation

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i 28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi

More information

LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L

LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L LAN PC LAN LAN LAN LAN LAN LAN 1 はじめに WWW World Wide Web Windows WWW Tim Berners Lee THIS IS FOR EVERYONE PC PC LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson,

More information

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information