WEKO3
アイテム
{"_buckets": {"deposit": "f1afa3ed-457c-4a1a-b920-38d5b3666791"}, "_deposit": {"created_by": 2, "id": "10646", "owners": [2], "pid": {"revision_id": 0, "type": "depid", "value": "10646"}, "status": "published"}, "_oai": {"id": "oai:nagasaki-u.repo.nii.ac.jp:00010646", "sets": ["830"]}, "author_link": ["42078", "42077"], "item_3_alternative_title_19": {"attribute_name": "その他のタイトル", "attribute_value_mlt": [{"subitem_alternative_title": "The Danger of the Passive Attack on the Internet"}]}, "item_3_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2000-12-25", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "3", "bibliographicPageEnd": "144", "bibliographicPageStart": "123", "bibliographicVolumeNumber": "80", "bibliographic_titles": [{"bibliographic_title": "経営と経済"}, {"bibliographic_title": "Journal of Business and Economics", "bibliographic_titleLang": "en"}]}]}, "item_3_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "The Internet is on the way to become a common infrastructure for everyone. But, it is hard to catch up the current situation for both applications and users. Many developers of applications, which depend on the Internet, like e-mail clients, did not consider about to protecting one\u0027s personal information. In this situation, scoundrels will attack people by means of to be famous, to show their skills, just for fun, and so on. There was no problem if users were doing a suitable defense countermeasure. But, now, network applications with poor consideration by their developers, users must consider about new style of attack \"passive attack\". In this paper, the author classifies the types of attacks observed on the Internet, and explains the current security levels on some network client applications as a practice.", "subitem_description_type": "Abstract"}]}, "item_3_description_64": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "経営と経済, 80(3), pp.123-144; 2000", "subitem_description_type": "Other"}]}, "item_3_full_name_3": {"attribute_name": "著者別名", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "42078", "nameIdentifierScheme": "WEKO"}], "names": [{"name": "Suzuki, Hitoshi"}]}]}, "item_3_publisher_33": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "長崎大学経済学会"}]}, "item_3_relation_29": {"attribute_name": "論文ID(NAID)", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "110000181500", "subitem_relation_type_select": "NAID"}}]}, "item_3_source_id_10": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AN00069150", "subitem_source_identifier_type": "NCID"}]}, "item_3_source_id_7": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "02869101", "subitem_source_identifier_type": "ISSN"}]}, "item_3_text_62": {"attribute_name": "sortkey", "attribute_value_mlt": [{"subitem_text_value": "6"}]}, "item_3_version_type_16": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "鈴木, 斉"}], "nameIdentifiers": [{"nameIdentifier": "42077", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2020-12-22"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "keieikeizai80_03_06.pdf", "filesize": [{"value": "890.3 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 890300.0, "url": {"label": "keieikeizai80_03_06.pdf", "url": "https://nagasaki-u.repo.nii.ac.jp/record/10646/files/keieikeizai80_03_06.pdf"}, "version_id": "3ce3c500-a9f4-4faf-9a8f-ff9341f3217f"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "jpn"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "departmental bulletin paper", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "受動的攻撃の危険性と防衛対策", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "受動的攻撃の危険性と防衛対策"}]}, "item_type_id": "3", "owner": "2", "path": ["830"], "permalink_uri": "http://hdl.handle.net/10069/29187", "pubdate": {"attribute_name": "公開日", "attribute_value": "2012-09-06"}, "publish_date": "2012-09-06", "publish_status": "0", "recid": "10646", "relation": {}, "relation_version_is_last": true, "title": ["受動的攻撃の危険性と防衛対策"], "weko_shared_id": 2}
受動的攻撃の危険性と防衛対策
http://hdl.handle.net/10069/29187
http://hdl.handle.net/10069/29187bdefb423-760d-4266-aed3-46d35dae6d7c
名前 / ファイル | ライセンス | アクション |
---|---|---|
keieikeizai80_03_06.pdf (890.3 kB)
|
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2012-09-06 | |||||
タイトル | ||||||
タイトル | 受動的攻撃の危険性と防衛対策 | |||||
言語 | ||||||
言語 | jpn | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | departmental bulletin paper | |||||
著者 |
鈴木, 斉
× 鈴木, 斉 |
|||||
著者別名 | ||||||
姓名 | Suzuki, Hitoshi | |||||
その他のタイトル | ||||||
その他のタイトル | The Danger of the Passive Attack on the Internet | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | The Internet is on the way to become a common infrastructure for everyone. But, it is hard to catch up the current situation for both applications and users. Many developers of applications, which depend on the Internet, like e-mail clients, did not consider about to protecting one's personal information. In this situation, scoundrels will attack people by means of to be famous, to show their skills, just for fun, and so on. There was no problem if users were doing a suitable defense countermeasure. But, now, network applications with poor consideration by their developers, users must consider about new style of attack "passive attack". In this paper, the author classifies the types of attacks observed on the Internet, and explains the current security levels on some network client applications as a practice. | |||||
書誌情報 |
経営と経済 en : Journal of Business and Economics 巻 80, 号 3, p. 123-144, 発行日 2000-12-25 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 02869101 | |||||
書誌レコードID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AN00069150 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
論文ID(NAID) | ||||||
関連タイプ | isIdenticalTo | |||||
識別子タイプ | NAID | |||||
関連識別子 | 110000181500 | |||||
出版者 | ||||||
出版者 | 長崎大学経済学会 | |||||
sortkey | ||||||
6 | ||||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | 経営と経済, 80(3), pp.123-144; 2000 |