WEKO3
アイテム
{"_buckets": {"deposit": "fcc547d1-1329-4365-adfa-859fb30e2ad1"}, "_deposit": {"created_by": 10, "id": "2529", "owners": [10], "pid": {"revision_id": 0, "type": "depid", "value": "2529"}, "status": "published"}, "_oai": {"id": "oai:nuis.repo.nii.ac.jp:00002529", "sets": ["72"]}, "author_link": ["2882", "2881"], "item_10002_biblio_info_7": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2005-03-22", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "203", "bibliographicPageStart": "191", "bibliographicVolumeNumber": "8", "bibliographic_titles": [{"bibliographic_title": "新潟国際情報大学情報文化学部紀要"}]}]}, "item_10002_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Way of Access control for business application systems was firstly implemented from computer systems or their operating systems\u0027 viewpoint. Then, for business use, several types of methodology for application systems have been created and any of these access control ability remains only inside of the methodology. These are natural and understandable. But, for the next stage of business application, it is necessary to introduce new sight or viewpoint from business administration. In this paper I observe some main existent access control and show their limit, then propose new viewpoints. They are \"Richness on description of real organization\", \"Flexibility on dynamic administration\", \"Balance of convenience and security\", \"Rest from human vulnerable ness\" and \"Information management\".", "subitem_description_type": "Abstract"}]}, "item_10002_publisher_8": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "新潟国際情報大学情報文化学部"}]}, "item_10002_source_id_11": {"attribute_name": "書誌レコードID(NCID)", "attribute_value_mlt": [{"subitem_source_identifier": "AA11231962", "subitem_source_identifier_type": "NCID"}]}, "item_10002_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1343-490X", "subitem_source_identifier_type": "ISSN"}]}, "item_10002_version_type_20": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "桑原, 悟"}, {"creatorName": "クワハラ, サトル", "creatorNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "2881", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kuwahara, Satoru", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "2882", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2018-07-06"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "8_kuwahara.pdf", "filesize": [{"value": "379.1 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 379100.0, "url": {"label": "8_kuwahara.pdf", "url": "https://nuis.repo.nii.ac.jp/record/2529/files/8_kuwahara.pdf"}, "version_id": "795557d1-d658-4d29-8586-b13458a1ecd0"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "jpn"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "departmental bulletin paper", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "ビジネスアプリケーションのための新しいアクセス管理の視点", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "ビジネスアプリケーションのための新しいアクセス管理の視点"}, {"subitem_title": "A new viewpoint of access control for business application", "subitem_title_language": "en"}]}, "item_type_id": "10002", "owner": "10", "path": ["72"], "permalink_uri": "https://nuis.repo.nii.ac.jp/records/2529", "pubdate": {"attribute_name": "公開日", "attribute_value": "2010-12-15"}, "publish_date": "2010-12-15", "publish_status": "0", "recid": "2529", "relation": {}, "relation_version_is_last": true, "title": ["ビジネスアプリケーションのための新しいアクセス管理の視点"], "weko_shared_id": -1}
ビジネスアプリケーションのための新しいアクセス管理の視点
https://nuis.repo.nii.ac.jp/records/2529
https://nuis.repo.nii.ac.jp/records/252984f163fa-ded6-4d91-938f-b6586e57cdcc
名前 / ファイル | ライセンス | アクション |
---|---|---|
8_kuwahara.pdf (379.1 kB)
|
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2010-12-15 | |||||
タイトル | ||||||
タイトル | ビジネスアプリケーションのための新しいアクセス管理の視点 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | A new viewpoint of access control for business application | |||||
言語 | ||||||
言語 | jpn | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | departmental bulletin paper | |||||
著者 |
桑原, 悟
× 桑原, 悟× Kuwahara, Satoru |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Way of Access control for business application systems was firstly implemented from computer systems or their operating systems' viewpoint. Then, for business use, several types of methodology for application systems have been created and any of these access control ability remains only inside of the methodology. These are natural and understandable. But, for the next stage of business application, it is necessary to introduce new sight or viewpoint from business administration. In this paper I observe some main existent access control and show their limit, then propose new viewpoints. They are "Richness on description of real organization", "Flexibility on dynamic administration", "Balance of convenience and security", "Rest from human vulnerable ness" and "Information management". | |||||
書誌情報 |
新潟国際情報大学情報文化学部紀要 巻 8, p. 191-203, 発行日 2005-03-22 |
|||||
出版者 | ||||||
出版者 | 新潟国際情報大学情報文化学部 | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 1343-490X | |||||
NCID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AA11231962 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |