{"created":"2023-07-25T10:31:05.129577+00:00","id":10426,"links":{},"metadata":{"_buckets":{"deposit":"5c5731eb-0611-4eb8-8a82-7082dd4b9384"},"_deposit":{"created_by":4,"id":"10426","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"10426"},"status":"published"},"_oai":{"id":"oai:naist.repo.nii.ac.jp:00010426","sets":["34:38"]},"author_link":["30523"],"item_11_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"静的解析を用いたアクセス制御システムのセキュリティ保証技術に関する研究","subitem_alternative_title_language":"ja"},{"subitem_alternative_title":"セイテキ カイセキ オ モチイタ アクセス セイギョ システム ノ セキュリティ ホショウ ギジュツ ニ カンスル ケンキュウ","subitem_alternative_title_language":"ja-Kana"}]},"item_11_biblio_info_8":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-03-24","bibliographicIssueDateType":"Issued"}}]},"item_11_date_granted_18":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2004-03-24"}]},"item_11_degree_grantor_17":{"attribute_name":"学位授与機関","attribute_value_mlt":[{"subitem_degreegrantor":[{"subitem_degreegrantor_language":"ja","subitem_degreegrantor_name":"奈良先端科学技術大学院大学"}],"subitem_degreegrantor_identifier":[{"subitem_degreegrantor_identifier_name":"14603","subitem_degreegrantor_identifier_scheme":"kakenhi"}]}]},"item_11_degree_name_16":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"博士(工学)","subitem_degreename_language":"ja"}]},"item_11_description_15":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"text","subitem_description_type":"Other"}]},"item_11_dissertation_number_19":{"attribute_name":"学位授与番号","attribute_value_mlt":[{"subitem_dissertationnumber":"甲第394号"}]},"item_11_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.34413/dr.00394","subitem_identifier_reg_type":"JaLC"}]},"item_11_publisher_9":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Nara Institute of Science and Technology","subitem_publisher_language":"en"}]},"item_11_text_21":{"attribute_name":"電子化ID","attribute_value_mlt":[{"subitem_text_value":"R002777"},{"subitem_text_value":"R004729"}]},"item_11_version_type_13":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kuninobu, Shigeta","creatorNameLang":"en"},{"creatorName":"クニノブ, シゲタ","creatorNameLang":"ja-Kana"},{"creatorName":"國信, 茂太","creatorNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"30523","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-06"}],"displaytype":"detail","filename":"R002777.pdf","filesize":[{"value":"669.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"fulltext","objectType":"fulltext","url":"https://naist.repo.nii.ac.jp/record/10426/files/R002777.pdf"},"version_id":"00600ab5-780a-41ee-b4a1-01140ea77318"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-06"}],"displaytype":"detail","filename":"R004729.pdf","filesize":[{"value":"272.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"abstract","objectType":"abstract","url":"https://naist.repo.nii.ac.jp/record/10426/files/R004729.pdf"},"version_id":"1076f29e-ef8f-49c4-84de-9a7880459894"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Access control","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Policy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Information flow analysis","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Security verification","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Model checking","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"doctoral thesis","resourceuri":"http://purl.org/coar/resource_type/c_db06"}]},"item_title":"Security assurance methods for access control systems using static analysis","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Security assurance methods for access control systems using static analysis","subitem_title_language":"en"}]},"item_type_id":"11","owner":"4","path":["38"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2006-07-31"},"publish_date":"2006-07-31","publish_status":"0","recid":"10426","relation_version_is_last":true,"title":["Security assurance methods for access control systems using static analysis"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-09-29T06:29:41.320723+00:00"}