{"created":"2023-07-25T10:31:22.272899+00:00","id":10777,"links":{},"metadata":{"_buckets":{"deposit":"f7564b88-9a72-4584-b0ab-997cbf4fda93"},"_deposit":{"created_by":4,"id":"10777","owners":[4],"pid":{"revision_id":0,"type":"depid","value":"10777"},"status":"published"},"_oai":{"id":"oai:naist.repo.nii.ac.jp:00010777","sets":["34:38"]},"author_link":["31287"],"item_11_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"XMLおよび関係データベースにおける推論攻撃に対する安全性検証法","subitem_alternative_title_language":"ja"},{"subitem_alternative_title":"XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ","subitem_alternative_title_language":"ja-Kana"}]},"item_11_biblio_info_8":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-06-25","bibliographicIssueDateType":"Issued"}}]},"item_11_date_granted_18":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2015-06-25"}]},"item_11_degree_grantor_17":{"attribute_name":"学位授与機関","attribute_value_mlt":[{"subitem_degreegrantor":[{"subitem_degreegrantor_language":"ja","subitem_degreegrantor_name":"奈良先端科学技術大学院大学"}],"subitem_degreegrantor_identifier":[{"subitem_degreegrantor_identifier_name":"14603","subitem_degreegrantor_identifier_scheme":"kakenhi"}]}]},"item_11_degree_name_16":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"博士(工学)","subitem_degreename_language":"ja"}]},"item_11_description_15":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"text","subitem_description_type":"Other"}]},"item_11_dissertation_number_19":{"attribute_name":"学位授与番号","attribute_value_mlt":[{"subitem_dissertationnumber":"甲第1291号"}]},"item_11_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.34413/dr.01291","subitem_identifier_reg_type":"JaLC"}]},"item_11_publisher_9":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Nara Institute of Science and Technology","subitem_publisher_language":"en"}]},"item_11_text_21":{"attribute_name":"電子化ID","attribute_value_mlt":[{"subitem_text_value":"R012228"},{"subitem_text_value":"R012236"}]},"item_11_version_type_13":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"PHONHARATH, CHITTAPHONE","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"31287","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-07"}],"displaytype":"detail","filename":"R012228.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"fulltext","objectType":"fulltext","url":"https://naist.repo.nii.ac.jp/record/10777/files/R012228.pdf"},"version_id":"d32b799e-564e-422a-8e3a-802408148137"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-07"}],"displaytype":"detail","filename":"R012236.pdf","filesize":[{"value":"352.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"abstract","objectType":"abstract","url":"https://naist.repo.nii.ac.jp/record/10777/files/R012236.pdf"},"version_id":"f3c797c7-ea8b-412a-ab83-f88aad4cec37"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Database Security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Privacy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Diversity","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Inference Attacks","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Relational Databases","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"doctoral thesis","resourceuri":"http://purl.org/coar/resource_type/c_db06"}]},"item_title":"Verification Methods for Security against Inference Attacks on XML and Relational Databases","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Verification Methods for Security against Inference Attacks on XML and Relational Databases","subitem_title_language":"en"}]},"item_type_id":"11","owner":"4","path":["38"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2015-07-24"},"publish_date":"2015-07-24","publish_status":"0","recid":"10777","relation_version_is_last":true,"title":["Verification Methods for Security against Inference Attacks on XML and Relational Databases"],"weko_creator_id":"4","weko_shared_id":-1},"updated":"2023-09-11T03:00:15.878584+00:00"}