Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama, 1 Hiroshi Yajima, 1, 2 Kiyomi Yaegashi, 4 Yasuhiro Kawashima 5 and Hiroshi Yoshiura 6 Businesses and society face various risks, and measures to reduce one risk often cause another risk. It may be said that nowadays is the times of the risk vs. the risk. For this reason, the risk communication for forming agreement among decision-making persons, such as manager, customers, and employees, is becoming important. However, it is not easy to search for the combinations of the optimal measures, reducing the risk based on the concept which is opposed to each other, such as security, privacy, and development cost, and taking agreement. This situation requires development of the multiple risk communicator (MRC) with the functions of which are (1) Modeling support part for expert, (2) optimization engine, and (3) displaying the computed result to decision-making persons. In this paper, after describing a developments design of MRC, we explain the implemented MRC program and its application results to personal information leakage problems, illegal copying problems, and inner control problems with evaluation on the usefulness and issues to be solved in future. 1. 1 1 1 1 Tokyo Denki University 2 Researcher of RISTEX JST 3 IT IT DORAKU RESEARCH LAB. Ltd. 4 PinpointService, Inc. 5 AdIn Research, Inc. 6 The University of Electro-Communications 2007 10 CSEC 3180 c 2008 Information Processing Society of Japan
3181 Multiple Risk Communicator: MRC 1) 2) 13) 1 2 3 MRC 14) MRC MRC MRC MRC 2. MRC MRC 2 (1) (2) (3) 1 MRC 2 MRC 1 2 MRC Fig. 1 Image of method for solving the conflict between risks. Fig. 2 Development objectives and characteristics of MRC.
3182 MRC 1 2 3 4 + 5 FTA 11) 1 3 1 0 1 MRC MRC 6 1 4 a b c d e X i i 0-1 C i D i1 D i2 1 1 Table 1 Examples of the countermeasures and the values of parameters. 3 Fig. 3 Example of fault tree for information leakage by injustice person in inside. P α1 P α2 P β 1 3 C t D 1 D 2 P t
3183 2 3 1 L 4 a b 5 6 2 3. MRC MRC 1 5 (1) MRC (2) PC PC PC MRC 4 2 PC 4 Fig. 4 Image of formulated result. 5 MRC Fig. 5 Structure of MRC program.
3184 6 MRC Fig. 6 Image of display for experts in MRC program. Fig. 7 7 Display for individuals involved in decision making. PC 2 1 15 32 12) Mathematica 9) MRC PC 12 3 1 2 6 2 1 PC 7 1 L 1 100 MRC WEB 1 PC MRC PC PC 4. MRC 4.1 MRC 4.1.1 MRC 3 (1) (2) MRC (3)
3185 2 Table 2 Applied results of MRC. MRC 3 MRC 1 2 2 PR V1 1 4.1.2 1 4) 2 J-SOX MRC 7) J-SOX ETA 3 MRC 5) ETA (1) CRYPTREC 10) (2) (3) (4) (1) (3) MRC 4.1.2 3 1 2 3 3 1 2
3186 3 Table 3 Applied results to private information leakage problems. 3 1 2),8) 8 3 3 1 1 0.15 8,000 0.30 0.30 1 2 (1) 0.1 (2) 0.15 0.15 0.1 3 2 6) MRC 15 5 1 2 MRC 3 MRC 13 3 12 4.1.3 MRC 2 4.1.2 2 2 4 2 2
3187 4 Table 4 Processing time. MRC 15 20 15 4.2 1 MRC 1 MRC FTA ETA 2 MRC 3 MRC 4 1 7 15 5 a b SI c 6 a b 3 2 1 2 MRC c 3 1 3) d
3188 3) 2 e 15 8 15 15 5. 1 (1) (2) MRC 1) Vol.46, No.8, pp.2120 2128 (2005). 2) Sasaki, R., et al.: Development Concept for and Trial Application of a Multiplex Risk Communicator, IFIP I3E2005, pp.607 621 (2005). 3) C pp.310 317 (Feb. 2008). 4) CSS2006 (Nov. 2006). 5) Vol.49, No.3, pp.1105 1118 (2008). 6) CSS2007 (Nov. 2007). 7) CSS2007 (Nov. 2007). 8) SCIS2006 (Jan. 2006). 9) http://www.hulinks.co.jp/software/mathematica/ 10) http://www.cryptrec.jp/ 11) McCormic, N.J.: Reliability and Risk Analysis, Academic Press Inc. (1981). 12) Gerfinkel, R.S., et al.: Integer Programming, Wiley and Sons (1972). 13) JIS TR X 0036-3:2001 3 (2001). 14) (1993). ( 19 11 29 ) ( 20 6 3 )
3189 1971 3 4 2001 4 2007 4 1998 2002 2007 19 1996 1999 IT 2008 2005 2007 IT 2006 3 4 2008 3 4 2007 3 4 1950 10 5 1975 3 1982 MIT 1999 2003 2004 4 IEEE HI 1957 4 10 1976 3 1977 SE 3D 1988 SE AI 1997 2005 AI
3190 1983 CAD/CAM CG 2001 1981 2003 IEEE 2000 2005 2005 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing Best Paper Award