クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応
|
|
- みさえ こやぎ
- 6 years ago
- Views:
Transcription
1 / /
2 multi-tenancy 228 /2011.1
3 SaaS 4 Vamosi [2008] 1 CPU CPU Ristenpart, Tromer, Shacham, and Savage [2009] Armbrust et al. [2009] ENISA [2009] 2009 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] SaaS Software as a Service 229
4 2. 1 IT 2009 National Institute for Standards and Technology; NIST 5 Mell and Grance [2009] ffl ffl ffl ffl ffl NIST Cloud Security Alliance Open Cloud Manifesto ENISA 5 NIST CSA [2009] ENISA [2009] OCM [2010] NIST 6 5ENISA European Network and Information Security Agency EU /2011.1
5 2 1 NIST 1 231
6 3. ffl SaaS Software as a Service Ajax 7 SaaS ID ffl PaaS Platform as a Service PaaS PaaS ffl IaaS Infrastructure as a Service OS IaaS. ffl 7Ajax Asynchronous JavaScript C XML 232 /2011.1
7 ffl ffl 1 ffl 4 ffl ffl 1 ffl 233
8 PDCA PDCA Plan Do Check Act /2011.1
9 PDCA PDCA D Plan Do Check Act PDCA. Plan
10 2 A B C 2 CPU Ristenpart, Tromer, Shacham, and Savage [2009] US Patriot Act EU 25 EU 236 /2011.1
11 ENISA ENISA [2009] 12 ENISA ENISA service level agreement; SLA EU 12 ENISA 1 13 Armbrust et al. [2009] 14 basically available soft state eventual consistency 3 BASE A B C D 16 PaaS 237
12 . Do Check Do Plan Check. Act Check SLA IaaS OS SaaS SLA /2011.1
13 ENISA [2009] 1 R DoS IP
14 ffl ffl ffl ffl Amazon EC /2011.1
15
16 3 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] RSA * van Dijk and Juels [2010] * 22 Wang, Wang, Ren, and Lou [2009] Bowers et al. [2010] Gentry [2009] van Dijk and Juels [2010] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] /2011.1
17 . 1 SAS-70 Statement on Auditing Standards ISMS ISMS Information Security Management System ISMS ISMS JIS Q ENISA [2009] ISMS PCI DSS * *PCIDSS Payment Card Industry Data Security Standard 5 Amex Discover JCB MasterCard VISA 243
18 /2011.1
19 NBL SaaS SLA IT 2010-CSEC Amazon EC2 DDoS BP
20 NBL CSEC IC BP Armbrust, Micheal, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB/EECS , Electrical Engineering and Computer Sciences, University of Berkeley, 10 February, Bowers, Kevin, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, IACR eprint 2010/214, IACR, Cloud Security Alliance (CSA), Security Guidance for Critical Area of Focus in Cloud Computing, V2.1, CSA, December, van Dijk, Marten, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan, Fully Homomorphic Encryption over the Integers, Proceedings of Eurocrypt 2010, LNCS 6110, Springer-Verlag, May, 2010, pp , and Ari Juels, On the Impossibility of Cryptography Alone for Privacy- Preserving Cloud Computing, IACR eprint 2010/305, IACR, European Network and Information Security Agency (ENISA), Cloud Computing Benefits, Risks and Recommendations for Information Security, ENISA, 20 November, 2009 ( cloud-computing-risk-assessment/). Gentry, Craig, A Fully Homomorphic Encryption Scheme, A Dissertation Submitted to the Department of Computer Science and the Committee on Graduate Studies of Stanford University, September, Mell, Peter, and Tim Grance, The NIST Definition of Cloud Computing, Version 15, NIST, 7 October, 2009 ( Open Cloud Manifesto (OCM), Cloud Computing Use Cases White Paper Version 3.0, OCM, 2 February, 2010 ( 246 /2011.1
21 Ristenpart, Thomas, Eran Tromer, Hovav Shacham, and Stefan Savage, Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, Proceedings of the 6th ACM Conference on Computer and Communications Security, ACM, Vamosi, Robert, Gmail Cookie Stolen via Google Spreadsheets, CNET, 14 April, 2008 ( Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou, Ensuring Data Storage Security in Cloud Computing, IACR eprint 2009/081, IACR,
22 1. ENISA [2009] R.1 R.2 R.3 R.4 R.5 R.6 R.7 R.8 R.9 R.10 R.11 R.12 R.13 R.14 R.15 Distributed Denial of Service 248 /2011.1
23 R.16 Economic Denial of Service R.17 R.18 R.19 R.20 R.21 R.22 R.23 R.24 service engine e-discovery R.25 R.26 R.27 R.28 R.29 R.30 R.31 R.32 R.33 R.34 R.35 R.2 R.3 R.23 R
24 Wang, Wang, Ren, and Lou [2009] 26 RSA % 26 Google File System /2011.1
25 Bowers et al. [2010] Bowers et al. [2010] Gentry [2009] van Dijk, Gentry, Halevi, and Vaikuntanathan [2010] 28 Bowers et al. [2010] 251
26 van Dijk and Juels [2010] Gentry [2009] Gentry [2009] /2011.1
クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応
IMES DISCUSSION PAPER SERIES Discussion Paper No. 2010-J-24 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 2-1-1 http://www.imes.boj.or.jp IMES Discussion Paper Series 2010-J-24 2010
More informationGoogle Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Informatio
On-premise 17 Google Eric Schmidt Search Engine Strategies Conference Schmidt NRIST Buzz Word NIST CSA Cloud Security Alliance ENISA European Network and Information Security Agency NIST IT NIST 18 On-demand
More information情報処理学会研究報告 場合における対策として有効である 大阪大学では 中長期的な目標として大学の ICT リソー スを集約し 大学全体としての ICT 投資を効率化するこ DMZ segment Firewall Load Balancer とを掲げている それに合わせて大阪大学全体としては業 務フ
1,a) 1,b) 1,c) 2,d) 1,e) 1 5 8 6 ( 9 3 ) Hiroki Kashiwazaki 1,a) Seiji Miyanaga 1,b) Yasuo Ebara 1,c) Kouhei Ichikawa 2,d) Morihara Ichirou 1,e) 1. 2006 Search Engine Strategies Conference Google CEO(
More information... 1... 3... 5... 5... 5... 6... 7... 7... 8... 8... 9... 9... 9... 10... 11... 11... 11... 11... 13... 15... 17... 19... 19... 21... 21... 22... 22... 23... 23... 25 ... 25... 27... 27... 28... 28...
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationスライド 1
FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP
More information04.™ƒ”R/’Ô”�/’Xfl©
Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP
More information研究レポート表紙.PDF
No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000
More informationIT IBM Corporation
2009/9/25 ATC. 1 2009 IBM Corporation 1. 1. 2. 3. IT 2 2009 IBM Corporation 2006 8 9 (?) Google CEO, Eric Schmidt @ Search Engine Strategies Conference (*) emergent () 10 Network ComputerAjax LAMP (Linux
More information技術流出防止指針公表用.PDF
15 3 1 4 .. 2 2.. 4. 6.10 10.14.16.19.24.26.28 1 2 1 2002 7 3 2002 3 4 2 3 5 4 4 6 7 8 5 5 9 plan (do) (check) (act) 1) 2) 3) 4) 5) 6) 7) 10 11 12 13 14 15 16 17 18 6 6 19 / / 20 21 22 7 23 8 24 25 26
More informationWindows Azure Platformを活用したPaaSサービス:FGCP/A5
Windows Azure Platform PaaS : PaaS Service Using Windows Azure Platform 門間 仁 あらまし 2010 7 FUJITSU Global Cloud Platform Powered by Windows Azure Azure Windows Azure Abstract Fujitsu is preparing to offer
More information電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて
1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008
More informationpaper
WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationuntitled
1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness
More informationuntitled
6000 4 10.5% 13.1% 8.2% [ 2005 ] IT 8 6.5% 2005 6855 6584 1.7 30% ISMS SOX 18 19 SOX 2007 2008 1 2 3 4 ASP SaaS 5 6 6.1 PCI DSS 6.2 6.3 ISO27004 ISMS 6.4 6.5 6.6 NIST SP 19
More informatione-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto
e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa
More informationuntitled
21 ISO9000 ISO9000 ISO ISO9000 ISO9001 2000 ISO14000 PDCA ISO9001 2000 ISO9000 GS PL CE SG PS MPS Master Production Schedule MRP Material Requirements Planning 1 MPS MPS 1 MRP MRP MPS MRP A F 22 18 18
More informationスライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
More informationIPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo
1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More information美唄市広報メロディー2014年1月号
1 2014 E-mailkouhoujouhou@city.bibai.lg.jp January May September October November December February March June July August April BIBAI CITY INFORMATION http://db.net-bibai.co.jp/bibai/
More informationVol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3
36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there
More information1 基本的考え方
... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.
More information4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5
No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet
More informationMATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~
MATLAB における並列 分散コンピューティング ~ Parallel Computing Toolbox & MATLAB Distributed Computing Server ~ MathWorks Japan Application Engineering Group Takashi Yoshida 2016 The MathWorks, Inc. 1 System Configuration
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More information中田真佐男 323‐352/323‐352
IT FinTech Finance Technology e SNS (AI) (2013) (2015) ATM IC EMV VISA MasterJCB VISA Master (Union Pay) VISA Master JCB J-Debit J-Debit VISA IC Alipay QR POS nanaco WAON EdyJR Suica PASMO au Master au
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationIT Information Technology Information and Communication Technology E mail IT -84-
Protection of personal information and privacy Shinako MATSUI* * 17 19 * -83- IT Information Technology Information and Communication Technology E mail 18 15 17 IT -84- -85- 1980 OECD Guidelines on the
More informationNovember 13 June 1 April 23 October 1 December 22 August 6 September 5 July 2 May 2 8 6 11 1 7 01 1516 4 23 4 1995 4 23 1999 4 23 19 2 02 88 5 2 3 03 6 1 6 1 300 4 04 100 7 2 7 2 706 15 2 5 05 8 6 86
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More information625†ific‚º”††j
Tamura Keiko T. 1 1965 8 11 2011 5 PAP: People s Action Party PAP PAP % 1960 PAP 1 1990 2011 5 2 PAP PAP 3 PAP PAP 2004 3 2006 10 15 20 4 PAP PAP No. 625 2013 10 45 1 1959 2011 1959 51 43 8 53.3 1963 51
More information1. 2
2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information.......p...{..P01-48(TF)
1 2 3 5 6 7 8 9 10 Act Plan Check Act Do Plan Check Do 11 12 13 14 INPUT OUTPUT 16 17 18 19 20 21 22 23 24 25 26 27 30 33 32 33 34 35 36 37 36 37 38 33 40 41 42 43 44 45 46 47 48 49 50 51 1. 2. 3.
More information2. Activity-Based Micro-Pricing 2.1 Activity-Based Micro-Pricing Activity-Based Micro-Pricing Activity- Based Micro-Pricing Activity-Based Micro-Prici
マルチメディア, 分散, 協調とモバイル (DICOMO2016) シンポジウム 平成 28 年 7 月 Blockchain-LI: Activity-Based Micro-Pricing 1 1 Activity-Based Micro-Pricing / Bitcoin Blockchain-LI Activity-Based Micro-Pricing Blockchian-LI Blockchain-LI:
More information金融分野のTPPsとAPIのオープン化:セキュリティ上の留意点
TPPs API FinTech TPPsThird Party Providers APIApplication Programming Interface TPPs API TPPs TPPs API TPPs TPPs API API APIFinTechTPPs... E-mail: keisuke.nakamura@boj.or.jp //2017.7 83 1. FinTech 1 2013
More informationスライド 1
WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client
More informationSA B A B ( A B ) AB( A B) AB AB S A B A B A B A B ( A B ) ( A B) (S A) (S B) S ( A B) ( y 1 + y 2 + y 3 + y 5 ) mod2( y 1 + y 2 + y 4 + y 6 ) mod2( y
S A BA B A B A B A B A B A S A A BAB A B ( A B ) ( A B) ( S A ) ( S B ) S ( A B) 4x 1 x 2 x 3 x 4 ( x 1 + x 2 + x 3 + x 5 ) mod2 = 0 ( x 1 + x 2 + x 4 + x 6 ) mod2 = 0 ( x 2 + x 3 + x 4 + x 7 ) mod2 =
More information内部監査で検討すべき10のIT項目
Insights on governance, risk and compliance 10 IT IT ...2...4...6...8...10 IT...12...14 IT...16...18...20...22...24 iii Insights on governance, risk and compliance IT IT??? IT 10 IT 10 IT Insights on governance,
More informationガイドブック
...3...5...6... 10 Windows 30/60/90... 13... 16... 18... 19... 21 2... 22...24... 26... 28... 32... 34... 35 B6 182 mm 128 mm Acrobat Reader 1 1 Acrobat X 2 Acrobat X 2 1. 5 2. 6 3. 10 4. 19 3 1 3 13 13Windows
More informationuntitled
IT 15 5 30 57 17 4 5 47 1 1 Q&A 2 17 11 4 6 11 12 13 14 16 19 20 23 10 26 11 29 12 33 13 34 14 34 15 35 16 35 17 36 18 37 19 38 20 39 21 43 22 43 23 43 24 43 25 44 26 44 27 44 28 44 29 44 30 45 48 51 53
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More information20141013_KAIT.pptx
2014 SNS 2014 10 13 @rhys_no1 yoshiaki@linkedopendata.jp NPO Liked Open Data Initiative (2012 -) World Wide Web Consortium (2011-2012 ) (1999-2005) () Open Data on the Web (World Wide Web Consortium, Open
More information66-5 足代訓史.pwd
plate-forme ICT BP p. 270 p. 135 pp. 135 136 JSPS SPACE ALC plateau : http://eow.alc.co.jp/search?q=plateau&ref=sa p. 136 SNS p. 222 Negoro and Ajiro 2013 4 AV p. 5 p. 5 p. 5 OS p. 5 p. 81 Eisenmann, Parker
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More information. 1 EBM Evidence-Based Medicine JCAHO 2
1 1 . 1 EBM Evidence-Based Medicine JCAHO 2 . 2 3 . 4 . 5 . When Where Who What Why How 6 . 7 3 DPC . 20 30 8 20 30 . (1) 9 3 BP mm mm . (2) 10 . http://epath.medis.or.jp/ 11 . 12 . 13 . 14 15 . PDCA Plan
More information46-3・4 田中志津子.pwd
CD EU Consumer Rights Act 2015 CRA CRA BIS: Department for Business, Inovation and Skills CRA http://www.meti.go.jp/policy/it_policy/ec/index.html#p01 Department for Business, Innovation and Skills Consumer
More information2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...
More informationWISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON
WISS2013 EpisoPass: EpisoPass: Password Management based on Episodic Memories Summary. / EpisoPass EpisoPass / 1 [29] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [32] [1][3][12][14][18][21][24]
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More information3論説_高橋.indd
2001 89 2006 543 5 6 2001 7 2006 59 5 8 2007: 60 Kingsoft Office 2007 1) 29 1999 2001 Tschang and Xue 2003 Li and Gao 2003 Wong and Wong 2004Yang et al. 2005 Shi et al. 2005 Wu and Miyazaki 2006 IT Li
More information量子暗号通信の仕組みと開発動向
RSA AES 1 BB84Y-00 E-mail: hitoshi.gotou-1@boj.or.jp //2009.10 107 1. 2008 10 9 20 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km 2. 1 3 2 1 2 108 /2009.10 1 2 2 109 2 ID IC KEELOQ 1 1 EUROCRYPT2008
More informationDEIM Forum 2009 B4-6, Str
DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data
More information432001 4.1 1990 1990 (Information Technology ) 1990 1992 19981998 28
432001 2739 Hisako ISHII 1990 (US Bureau of Labor Statistics, BLS)Monthly Labor Review MLR 25 19831993 20004.6 27 432001 4.1 1990 1990 (Information Technology ) 1990 1992 19981998 28 1990 8 7 6 5 4 3 2
More information資料3.doc
1 2 I. 1. 1 11 3 4 5 2. 2 http://www.state.gov/e/eb/rls/othr/2007/22281.htm 3 DOT http://ostpxweb.dot.gov/aviation/data/freedoms.htm 6 6 4 7 5 ECOFORUM24 4 2006 17 6 GATS GATS 1994 4 124 1995 1 1 8 7 Annex
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationYMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
More information2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL
1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More informationTf9-1-07-7168.dvi
/Review 1 1 1 1 2 Innovation Process Technology Hideyasu KARASAWA 1, Katsuro SAGANE 1, Hidenaga KARASAWA 1, Akira KURIYAMA 1, and Minoru KOBAYASHI 2 Abstract We propose a methodology for Innovation Process
More informationThe Institute for Economic Studies Seijo University 6 1 20, Seijo, Setagaya Tokyo 157-8511, Japan The Institute for Economic Studies Green Paper No. 59 Consumers Decision on the Choice of Small Payment
More informationjohokiso-internet
1 2 (Internet) : ( internet) : IP (The Internet) = Web? Internet, 1960 ARPAnet (Advanced Research Project Agency) : 1988 1989 + 1992 IIJ () 3 4 = (etc.) + = 1 () A B: A3 defaut: A2 A1 A3 B1 defaut: A2
More informationIP Management Within Universities: Experiences in the US
yuko.harayama@most.tohoku.ac.jp 17/3/2004 1 Ref. Sandelin TLO expertise Ref. AUTM 17/3/2004 2 Ref. Heller & Eisenberg, 1998 The scientific commons is becoming privatized! (Ref. Nelson, 2003) 17/3/2004
More information通し組/F7:論説:西垣鳴人(送り)
p EFT electronic funds transfer EFT IT IC integrated circuit IC IC IC IC IC IC IC debit system IC IC P NET IC IC EFT IC IC IC ATM IC IC http : //www.debitcard.gr.jp/about/index.html p p IC IC closed loop
More informationInnovation Linked Open Data Resource Description Framework Uniform Resource Identifier Open Government 25 5 23 2011 25 2013 6 26 2014 3 ...1 ICT 2...4...4.....5..6..9..9 13 15 15 22 24 26 26 27 29 32 43
More informationuntitled
NPO JNSA 3,500() 2003122 ISBN4-8443-1858-6 Copyright (c) 2003-2004 NPO Page 2 個人情報の社会状況 DMがよく届く 不正アクセス ウイルス 内部からの漏洩 電話勧誘が多い 外部 (インターネット) からの漏洩 サービス利用 名簿業者など 個人情報の提供 事業者 個人情報の売買 漏洩 情報主体 (本人) 何から行なえば良いか
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More informationSOZO_経営_PDF用.indd
Faculty of Business Administration Department of Business Administration CONTENTS ADMISSION POLICY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 INTERNET SOZO Wireless Network 16 Campus Life Calendar APRIL MAY JUNE
More informationDEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi
DEIM Forum 2019 H2-2 SuperSQL 223 8522 3 14 1 E-mail: {terui,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL SQL SuperSQL Web SuperSQL DBMS PipelineDB SuperSQL Web Web 1 SQL SuperSQL HTML SuperSQL
More information納品_20100326jim_ver099a _3_.docx
2010 3 0 BP 1 IT 18 6 18 9 18 < > 19 SaaS/ASP < > 21 2 ... 1 1.... 5 1-1.... 5 1-2.... 5 2.... 7 2-1.... 7 2-2.... 8 3.... 9 3-1. 3... 9 3-2.... 9 3-3.... 11 4.... 12 4-1.... 12 4-2.... 13 1.... 14 2....
More information2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More information本組/魚田勝臣、他
Business Review of the Senshu University No. 94, 1-15, 2012 IT PDCA PDCA 1 1 FORTRAN, COBOL ICT EDPS Electronic Data Processing SystemMIS Management Information SystemDSS Decision Support SystemSIS Strategic
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More information