ログイン
言語:

WEKO3

  • トップ
  • ランキング


インデックスリンク

インデックスツリー

  • RootNode

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 060 工学部
  2. 0601 学術論文

PORTAM: policy, requirements, and threats analyzer for mobile code applications.

http://hdl.handle.net/10091/3322
http://hdl.handle.net/10091/3322
b064889f-a54b-4865-bc8a-86dabedaf883
名前 / ファイル ライセンス アクション
PORTAM2008.pdf PORTAM2008.pdf (1.2 MB)
Item type 学術雑誌論文 / Journal Article(1)
公開日 2009-10-07
タイトル
タイトル PORTAM: policy, requirements, and threats analyzer for mobile code applications.
言語
言語 eng
DOI
関連識別子 https://doi.org/10.2201/NiiPi.2008.5.3
関連名称 10.2201/NiiPi.2008.5.3
キーワード
主題 Requiremtnts analysis, security policy, mobile code application, tool
資源タイプ
資源 http://purl.org/coar/resource_type/c_6501
タイプ journal article
著者 Kaiya, H

× Kaiya, H

Kaiya, H

Search repository
Sasaki, K

× Sasaki, K

Sasaki, K

Search repository
Kaijiri, K

× Kaijiri, K

Kaijiri, K

Search repository
信州大学研究者総覧へのリンク
氏名 Kaijiri, K
URL http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html
出版者
出版者 National Institute of Informatics
引用
内容記述 Progress in Informatics. 5:7-18 (2008)
書誌情報 Progress in Informatics

巻 5, p. 7-18, 発行日 2008-04
抄録
内容記述 Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for it before they actually use or develop it. In particular, they should be more careful when certain components or services are provided by third-parties. However, few tools can help identify and highlight threats to the security requirements. In this paper, we present a support tool called “PORTAM” for such users and providers to better understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements could be satisfied or the threats avoided. The tool also helps them to decide these kinds of trade-offs. The current version of this tool handles Java mobile code applications, thus users of our tool can readily understand the existence of real threats. Although the current version deals with only Java components, the ideas behind the tool can be applied to software in general. We complete this report by discussing some experimental results to confirm the usefulness for pedagogical purposes.
資源タイプ(コンテンツの種類)
ISSN
収録物識別子タイプ ISSN
収録物識別子 1349-8614
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AA12018938
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 11:24:14.319941
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3