WEKO3
-
RootNode
アイテム
PORTAM: policy, requirements, and threats analyzer for mobile code applications.
http://hdl.handle.net/10091/3322
http://hdl.handle.net/10091/3322b064889f-a54b-4865-bc8a-86dabedaf883
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2009-10-07 | |||||
タイトル | ||||||
タイトル | PORTAM: policy, requirements, and threats analyzer for mobile code applications. | |||||
言語 | ||||||
言語 | eng | |||||
DOI | ||||||
関連識別子 | https://doi.org/10.2201/NiiPi.2008.5.3 | |||||
関連名称 | 10.2201/NiiPi.2008.5.3 | |||||
キーワード | ||||||
主題 | Requiremtnts analysis, security policy, mobile code application, tool | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
Kaiya, H
× Kaiya, H× Sasaki, K× Kaijiri, K |
|||||
信州大学研究者総覧へのリンク | ||||||
表示名 | Kaijiri, K | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html | |||||
出版者 | ||||||
出版者 | National Institute of Informatics | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | Progress in Informatics. 5:7-18 (2008) | |||||
書誌情報 |
Progress in Informatics 巻 5, p. 7-18, 発行日 2008-04 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for it before they actually use or develop it. In particular, they should be more careful when certain components or services are provided by third-parties. However, few tools can help identify and highlight threats to the security requirements. In this paper, we present a support tool called “PORTAM” for such users and providers to better understand the threats and the requirements. Suppose some requirements cannot be satisfied when some threats are avoided, and vice versa. In such cases, they should decide whether the requirements could be satisfied or the threats avoided. The tool also helps them to decide these kinds of trade-offs. The current version of this tool handles Java mobile code applications, thus users of our tool can readily understand the existence of real threats. Although the current version deals with only Java components, the ideas behind the tool can be applied to software in general. We complete this report by discussing some experimental results to confirm the usefulness for pedagogical purposes. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 1349-8614 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA12018938 | |||||
出版タイプ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |
Share
Cite as
Kaiya, H, Sasaki, K, Kaijiri, K, 2008, PORTAM: policy, requirements, and threats analyzer for mobile code applications.: National Institute of Informatics, 7–18 p.
Loading...