クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

Size: px
Start display at page:

Download "クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応"

Transcription

1 / /

2 multi-tenancy 228 /2011.1

3 SaaS 4 Vamosi [2008] 1 CPU CPU Ristenpart, Tromer, Shacham, and Savage [2009] Armbrust et al. [2009] ENISA [2009] 2009 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] SaaS Software as a Service 229

4 2. 1 IT 2009 National Institute for Standards and Technology; NIST 5 Mell and Grance [2009] ffl ffl ffl ffl ffl NIST Cloud Security Alliance Open Cloud Manifesto ENISA 5 NIST CSA [2009] ENISA [2009] OCM [2010] NIST 6 5ENISA European Network and Information Security Agency EU /2011.1

5 2 1 NIST 1 231

6 3. ffl SaaS Software as a Service Ajax 7 SaaS ID ffl PaaS Platform as a Service PaaS PaaS ffl IaaS Infrastructure as a Service OS IaaS. ffl 7Ajax Asynchronous JavaScript C XML 232 /2011.1

7 ffl ffl 1 ffl 4 ffl ffl 1 ffl 233

8 PDCA PDCA Plan Do Check Act /2011.1

9 PDCA PDCA D Plan Do Check Act PDCA. Plan

10 2 A B C 2 CPU Ristenpart, Tromer, Shacham, and Savage [2009] US Patriot Act EU 25 EU 236 /2011.1

11 ENISA ENISA [2009] 12 ENISA ENISA service level agreement; SLA EU 12 ENISA 1 13 Armbrust et al. [2009] 14 basically available soft state eventual consistency 3 BASE A B C D 16 PaaS 237

12 . Do Check Do Plan Check. Act Check SLA IaaS OS SaaS SLA /2011.1

13 ENISA [2009] 1 R DoS IP

14 ffl ffl ffl ffl Amazon EC /2011.1

15

16 3 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] RSA * van Dijk and Juels [2010] * 22 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] van Dijk and Juels [2010] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] /2011.1

17 . 1 SAS-70 Statement on Auditing Standards ISMS ISMS Information Security Management System ISMS ISMS JIS Q ENISA [2009] ISMS PCI DSS * *PCIDSS Payment Card Industry Data Security Standard 5 Amex Discover JCB MasterCard VISA 243

18 /2011.1

19 NBL SaaS SLA IT 2010-CSEC Amazon EC2 DDoS BP

20 NBL CSEC IC BP Armbrust, Micheal, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB/EECS , Electrical Engineering and Computer Sciences, University of Berkeley, 10 February, Bowers, Kevin, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, IACR eprint 2010/214, IACR, Cloud Security Alliance (CSA), Security Guidance for Critical Area of Focus in Cloud Computing, V2.1, CSA, December, van Dijk, Marten, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan, Fully Homomorphic Encryption over the Integers, Proceedings of Eurocrypt 2010, LNCS 6110, Springer-Verlag, May, 2010, pp , and Ari Juels, On the Impossibility of Cryptography Alone for Privacy- Preserving Cloud Computing, IACR eprint 2010/305, IACR, European Network and Information Security Agency (ENISA), Cloud Computing Benefits, Risks and Recommendations for Information Security, ENISA, 20 November, 2009 ( cloud-computing-risk-assessment/). Gentry, Craig, A Fully Homomorphic Encryption Scheme, A Dissertation Submitted to the Department of Computer Science and the Committee on Graduate Studies of Stanford University, September, Mell, Peter, and Tim Grance, The NIST Definition of Cloud Computing, Version 15, NIST, 7 October, 2009 ( Open Cloud Manifesto (OCM), Cloud Computing Use Cases White Paper Version 3.0, OCM, 2 February, 2010 ( 246 /2011.1

21 Ristenpart, Thomas, Eran Tromer, Hovav Shacham, and Stefan Savage, Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, Proceedings of the 6th ACM Conference on Computer and Communications Security, ACM, Vamosi, Robert, Gmail Cookie Stolen via Google Spreadsheets, CNET, 14 April, 2008 ( Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing, IACR eprint 2009/081, IACR,

22 1. ENISA [2009] R.1 R.2 R.3 R.4 R.5 R.6 R.7 R.8 R.9 R.10 R.11 R.12 R.13 R.14 R.15 Distributed Denial of Service 248 /2011.1

23 R.16 Economic Denial of Service R.17 R.18 R.19 R.20 R.21 R.22 R.23 R.24 service engine e-discovery R.25 R.26 R.27 R.28 R.29 R.30 R.31 R.32 R.33 R.34 R.35 R.2 R.3 R.23 R

24 Wang, Wang, Ren, and Lou [2009] 26 RSA % 26 Google File System /2011.1

25 Bowers et al. [2010] Bowers et al. [2010] Gentry [2009] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] 28 Bowers et al. [2010] 251

26 van Dijk and Juels [2010] Gentry [2009] Gentry [2009] /2011.1

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応 IMES DISCUSSION PAPER SERIES Discussion Paper No. 2010-J-24 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 2-1-1 http://www.imes.boj.or.jp IMES Discussion Paper Series 2010-J-24 2010

More information

Google Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Informatio

Google Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Informatio On-premise 17 Google Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Information Security Agency NIST IT NIST 18 On-demand

More information

... 1... 3... 5... 5... 5... 6... 7... 7... 8... 8... 9... 9... 9... 10... 11... 11... 11... 11... 13... 15... 17... 19... 19... 21... 21... 22... 22... 23... 23... 25 ... 25... 27... 27... 28... 28...

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

スライド 1

スライド 1 FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

研究レポート表紙.PDF

研究レポート表紙.PDF No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000

More information

IT IBM Corporation

IT IBM Corporation 2009/9/25 ATC. 1 2009 IBM Corporation 1. 1. 2. 3. IT 2 2009 IBM Corporation 2006 8 9 (?) Google CEO, Eric Schmidt @ Search Engine Strategies Conference (*) emergent () 10 Network ComputerAjax LAMP (Linux

More information

技術流出防止指針公表用.PDF

技術流出防止指針公表用.PDF 15 3 1 4 .. 2 2.. 4. 6.10 10.14.16.19.24.26.28 1 2 1 2002 7 3 2002 3 4 2 3 5 4 4 6 7 8 5 5 9 plan (do) (check) (act) 1) 2) 3) 4) 5) 6) 7) 10 11 12 13 14 15 16 17 18 6 6 19 / / 20 21 22 7 23 8 24 25 26

More information

Windows Azure Platformを活用したPaaSサービス:FGCP/A5

Windows Azure Platformを活用したPaaSサービス:FGCP/A5 Windows Azure Platform PaaS : PaaS Service Using Windows Azure Platform 門間 仁 あらまし 2010 7 FUJITSU Global Cloud Platform Powered by Windows Azure Azure Windows Azure Abstract Fujitsu is preparing to offer

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

paper

paper WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

untitled

untitled 1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness

More information

untitled

untitled 6000 4 10.5% 13.1% 8.2% [ 2005 ] IT 8 6.5% 2005 6855 6584 1.7 30% ISMS SOX 18 19 SOX 2007 2008 1 2 3 4 ASP SaaS 5 6 6.1 PCI DSS 6.2 6.3 ISO27004 ISMS 6.4 6.5 6.6 NIST SP 19

More information

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa

More information

untitled

untitled 21 ISO9000 ISO9000 ISO ISO9000 ISO9001 2000 ISO14000 PDCA ISO9001 2000 ISO9000 GS PL CE SG PS MPS Master Production Schedule MRP Material Requirements Planning 1 MPS MPS 1 MRP MRP MPS MRP A F 22 18 18

More information

スライド 1

スライド 1 IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS

More information

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo 1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

美唄市広報メロディー2014年1月号

美唄市広報メロディー2014年1月号 1 2014 E-mailkouhoujouhou@city.bibai.lg.jp January May September October November December February March June July August April BIBAI CITY INFORMATION http://db.net-bibai.co.jp/bibai/

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

1 基本的考え方

1 基本的考え方 ... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.

More information

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5 No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet

More information

MATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~

MATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~ MATLAB における並列 分散コンピューティング ~ Parallel Computing Toolbox & MATLAB Distributed Computing Server ~ MathWorks Japan Application Engineering Group Takashi Yoshida 2016 The MathWorks, Inc. 1 System Configuration

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

中田真佐男 323‐352/323‐352

中田真佐男 323‐352/323‐352 IT FinTech Finance Technology e SNS (AI) (2013) (2015) ATM IC EMV VISA MasterJCB VISA Master (Union Pay) VISA Master JCB J-Debit J-Debit VISA IC Alipay QR POS nanaco WAON EdyJR Suica PASMO au Master au

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

IT Information Technology Information and Communication Technology E mail IT -84-

IT Information Technology Information and Communication Technology E mail IT -84- Protection of personal information and privacy Shinako MATSUI* * 17 19 * -83- IT Information Technology Information and Communication Technology E mail 18 15 17 IT -84- -85- 1980 OECD Guidelines on the

More information

November 13 June 1 April 23 October 1 December 22 August 6 September 5 July 2 May 2 8 6 11 1 7 01 1516 4 23 4 1995 4 23 1999 4 23 19 2 02 88 5 2 3 03 6 1 6 1 300 4 04 100 7 2 7 2 706 15 2 5 05 8 6 86

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

625†ific‚º”††j

625†ific‚º”††j Tamura Keiko T. 1 1965 8 11 2011 5 PAP: People s Action Party PAP PAP % 1960 PAP 1 1990 2011 5 2 PAP PAP 3 PAP PAP 2004 3 2006 10 15 20 4 PAP PAP No. 625 2013 10 45 1 1959 2011 1959 51 43 8 53.3 1963 51

More information

1. 2

1. 2 2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )

More information

Copyright

Copyright 2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

.......p...{..P01-48(TF)

.......p...{..P01-48(TF) 1 2 3 5 6 7 8 9 10 Act Plan Check Act Do Plan Check Do 11 12 13 14 INPUT OUTPUT 16 17 18 19 20 21 22 23 24 25 26 27 30 33 32 33 34 35 36 37 36 37 38 33 40 41 42 43 44 45 46 47 48 49 50 51 1. 2. 3.

More information

2. Activity-Based Micro-Pricing 2.1 Activity-Based Micro-Pricing Activity-Based Micro-Pricing Activity- Based Micro-Pricing Activity-Based Micro-Prici

2. Activity-Based Micro-Pricing 2.1 Activity-Based Micro-Pricing Activity-Based Micro-Pricing Activity- Based Micro-Pricing Activity-Based Micro-Prici マルチメディア, 分散, 協調とモバイル (DICOMO2016) シンポジウム 平成 28 年 7 月 Blockchain-LI: Activity-Based Micro-Pricing 1 1 Activity-Based Micro-Pricing / Bitcoin Blockchain-LI Activity-Based Micro-Pricing Blockchian-LI Blockchain-LI:

More information

金融分野のTPPsとAPIのオープン化:セキュリティ上の留意点

金融分野のTPPsとAPIのオープン化:セキュリティ上の留意点 TPPs API FinTech TPPsThird Party Providers APIApplication Programming Interface TPPs API TPPs TPPs API TPPs TPPs API API APIFinTechTPPs... E-mail: keisuke.nakamura@boj.or.jp //2017.7 83 1. FinTech 1 2013

More information

スライド 1

スライド 1 WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client

More information

SA B A B ( A B ) AB( A B) AB AB S A B A B A B A B ( A B ) ( A B) (S A) (S B) S ( A B) ( y 1 + y 2 + y 3 + y 5 ) mod2( y 1 + y 2 + y 4 + y 6 ) mod2( y

SA B A B ( A B ) AB( A B) AB AB S A B A B A B A B ( A B ) ( A B) (S A) (S B) S ( A B) ( y 1 + y 2 + y 3 + y 5 ) mod2( y 1 + y 2 + y 4 + y 6 ) mod2( y S A BA B A B A B A B A B A S A A BAB A B ( A B ) ( A B) ( S A ) ( S B ) S ( A B) 4x 1 x 2 x 3 x 4 ( x 1 + x 2 + x 3 + x 5 ) mod2 = 0 ( x 1 + x 2 + x 4 + x 6 ) mod2 = 0 ( x 2 + x 3 + x 4 + x 7 ) mod2 =

More information

内部監査で検討すべき10のIT項目

内部監査で検討すべき10のIT項目 Insights on governance, risk and compliance 10 IT IT ...2...4...6...8...10 IT...12...14 IT...16...18...20...22...24 iii Insights on governance, risk and compliance IT IT??? IT 10 IT 10 IT Insights on governance,

More information

ガイドブック

ガイドブック ...3...5...6... 10 Windows 30/60/90... 13... 16... 18... 19... 21 2... 22...24... 26... 28... 32... 34... 35 B6 182 mm 128 mm Acrobat Reader 1 1 Acrobat X 2 Acrobat X 2 1. 5 2. 6 3. 10 4. 19 3 1 3 13 13Windows

More information

untitled

untitled IT 15 5 30 57 17 4 5 47 1 1 Q&A 2 17 11 4 6 11 12 13 14 16 19 20 23 10 26 11 29 12 33 13 34 14 34 15 35 16 35 17 36 18 37 19 38 20 39 21 43 22 43 23 43 24 43 25 44 26 44 27 44 28 44 29 44 30 45 48 51 53

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

20141013_KAIT.pptx

20141013_KAIT.pptx 2014 SNS 2014 10 13 @rhys_no1 yoshiaki@linkedopendata.jp NPO Liked Open Data Initiative (2012 -) World Wide Web Consortium (2011-2012 ) (1999-2005) () Open Data on the Web (World Wide Web Consortium, Open

More information

66-5 足代訓史.pwd

66-5 足代訓史.pwd plate-forme ICT BP p. 270 p. 135 pp. 135 136 JSPS SPACE ALC plateau : http://eow.alc.co.jp/search?q=plateau&ref=sa p. 136 SNS p. 222 Negoro and Ajiro 2013 4 AV p. 5 p. 5 p. 5 OS p. 5 p. 81 Eisenmann, Parker

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

. 1 EBM Evidence-Based Medicine JCAHO 2

. 1 EBM Evidence-Based Medicine JCAHO 2 1 1 . 1 EBM Evidence-Based Medicine JCAHO 2 . 2 3 . 4 . 5 . When Where Who What Why How 6 . 7 3 DPC . 20 30 8 20 30 . (1) 9 3 BP mm mm . (2) 10 . http://epath.medis.or.jp/ 11 . 12 . 13 . 14 15 . PDCA Plan

More information

46-3・4 田中志津子.pwd

46-3・4 田中志津子.pwd CD EU Consumer Rights Act 2015 CRA CRA BIS: Department for Business, Inovation and Skills CRA http://www.meti.go.jp/policy/it_policy/ec/index.html#p01 Department for Business, Innovation and Skills Consumer

More information

2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...

More information

WISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON

WISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON WISS2013 EpisoPass: EpisoPass: Password Management based on Episodic Memories Summary. / EpisoPass EpisoPass / 1 [29] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [32] [1][3][12][14][18][21][24]

More information

...i A

...i A ...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20

More information

3論説_高橋.indd

3論説_高橋.indd 2001 89 2006 543 5 6 2001 7 2006 59 5 8 2007: 60 Kingsoft Office 2007 1) 29 1999 2001 Tschang and Xue 2003 Li and Gao 2003 Wong and Wong 2004Yang et al. 2005 Shi et al. 2005 Wu and Miyazaki 2006 IT Li

More information

量子暗号通信の仕組みと開発動向

量子暗号通信の仕組みと開発動向 RSA AES 1 BB84Y-00 E-mail: hitoshi.gotou-1@boj.or.jp //2009.10 107 1. 2008 10 9 20 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km 2. 1 3 2 1 2 108 /2009.10 1 2 2 109 2 ID IC KEELOQ 1 1 EUROCRYPT2008

More information

DEIM Forum 2009 B4-6, Str

DEIM Forum 2009 B4-6, Str DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data

More information

432001 4.1 1990 1990 (Information Technology ) 1990 1992 19981998 28

432001 4.1 1990 1990 (Information Technology ) 1990 1992 19981998 28 432001 2739 Hisako ISHII 1990 (US Bureau of Labor Statistics, BLS)Monthly Labor Review MLR 25 19831993 20004.6 27 432001 4.1 1990 1990 (Information Technology ) 1990 1992 19981998 28 1990 8 7 6 5 4 3 2

More information

資料3.doc

資料3.doc 1 2 I. 1. 1 11 3 4 5 2. 2 http://www.state.gov/e/eb/rls/othr/2007/22281.htm 3 DOT http://ostpxweb.dot.gov/aviation/data/freedoms.htm 6 6 4 7 5 ECOFORUM24 4 2006 17 6 GATS GATS 1994 4 124 1995 1 1 8 7 Annex

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

Tf9-1-07-7168.dvi

Tf9-1-07-7168.dvi /Review 1 1 1 1 2 Innovation Process Technology Hideyasu KARASAWA 1, Katsuro SAGANE 1, Hidenaga KARASAWA 1, Akira KURIYAMA 1, and Minoru KOBAYASHI 2 Abstract We propose a methodology for Innovation Process

More information

The Institute for Economic Studies Seijo University 6 1 20, Seijo, Setagaya Tokyo 157-8511, Japan The Institute for Economic Studies Green Paper No. 59 Consumers Decision on the Choice of Small Payment

More information

johokiso-internet

johokiso-internet 1 2 (Internet) : ( internet) : IP (The Internet) = Web? Internet, 1960 ARPAnet (Advanced Research Project Agency) : 1988 1989 + 1992 IIJ () 3 4 = (etc.) + = 1 () A B: A3 defaut: A2 A1 A3 B1 defaut: A2

More information

IP Management Within Universities: Experiences in the US

IP Management Within Universities: Experiences in the US yuko.harayama@most.tohoku.ac.jp 17/3/2004 1 Ref. Sandelin TLO expertise Ref. AUTM 17/3/2004 2 Ref. Heller & Eisenberg, 1998 The scientific commons is becoming privatized! (Ref. Nelson, 2003) 17/3/2004

More information

通し組/F7:論説:西垣鳴人(送り)

通し組/F7:論説:西垣鳴人(送り) p EFT electronic funds transfer EFT IT IC integrated circuit IC IC IC IC IC IC IC debit system IC IC P NET IC IC EFT IC IC IC ATM IC IC http : //www.debitcard.gr.jp/about/index.html p p IC IC closed loop

More information

Innovation Linked Open Data Resource Description Framework Uniform Resource Identifier Open Government 25 5 23 2011 25 2013 6 26 2014 3 ...1 ICT 2...4...4.....5..6..9..9 13 15 15 22 24 26 26 27 29 32 43

More information

untitled

untitled NPO JNSA 3,500() 2003122 ISBN4-8443-1858-6 Copyright (c) 2003-2004 NPO Page 2 個人情報の社会状況 DMがよく届く 不正アクセス ウイルス 内部からの漏洩 電話勧誘が多い 外部 (インターネット) からの漏洩 サービス利用 名簿業者など 個人情報の提供 事業者 個人情報の売買 漏洩 情報主体 (本人) 何から行なえば良いか

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

SOZO_経営_PDF用.indd

SOZO_経営_PDF用.indd Faculty of Business Administration Department of Business Administration CONTENTS ADMISSION POLICY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 INTERNET SOZO Wireless Network 16 Campus Life Calendar APRIL MAY JUNE

More information

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi DEIM Forum 2019 H2-2 SuperSQL 223 8522 3 14 1 E-mail: {terui,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL SQL SuperSQL Web SuperSQL DBMS PipelineDB SuperSQL Web Web 1 SQL SuperSQL HTML SuperSQL

More information

納品_20100326jim_ver099a _3_.docx

納品_20100326jim_ver099a _3_.docx 2010 3 0 BP 1 IT 18 6 18 9 18 < > 19 SaaS/ASP < > 21 2 ... 1 1.... 5 1-1.... 5 1-2.... 5 2.... 7 2-1.... 7 2-2.... 8 3.... 9 3-1. 3... 9 3-2.... 9 3-3.... 11 4.... 12 4-1.... 12 4-2.... 13 1.... 14 2....

More information

2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

本組/魚田勝臣、他

本組/魚田勝臣、他 Business Review of the Senshu University No. 94, 1-15, 2012 IT PDCA PDCA 1 1 FORTRAN, COBOL ICT EDPS Electronic Data Processing SystemMIS Management Information SystemDSS Decision Support SystemSIS Strategic

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information