{"created":"2023-05-15T13:52:08.832905+00:00","id":13930,"links":{},"metadata":{"_buckets":{"deposit":"5d512b6c-2086-4a7c-862e-ffb3e85e1d8e"},"_deposit":{"created_by":1,"id":"13930","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"13930"},"status":"published"},"_oai":{"id":"oai:chuo-u.repo.nii.ac.jp:00013930","sets":["800:921"]},"author_link":["51525"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2022-03-25","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"101","bibliographicPageStart":"91","bibliographicVolumeNumber":"2","bibliographic_titles":[{"bibliographic_title":"国際情報学研究"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Cyber-physical systems(CPS)contribute to the realization of Society 5.0,which is the society that Japan is aiming for,but there is a greater risk of cyber-attacks.Security measures are indispensable when infiltrating cyber-physical systems into critical infrastructure.However,even if there are no vulnerabilities with the system at the time of acceptance,new vulnerabilities may be discovered,or as the years go by,vulnerabilities may be embedded when a part of the system is updated or when operations vary.A mechanism that can carry out security diagnosis regularly would be required,and efficient implementation of diagnosis utilizing cloud computing environments is a candidate for its solution.In this paper,we clarify the issues when performing security diagnoses from the cloud and show two design patterns to deal with the emerging issues.Evaluation experiments were conducted after applying these two design patterns to the demonstration environment of CPS.As a result of the evaluation,we showed that the emerging issues could be handled by these two design patterns with cloud and cellular networks.","subitem_description_type":"Abstract"}]},"item_10002_full_name_32":{"attribute_name":"著者別名(英)","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"51525","nameIdentifierScheme":"WEKO"}],"names":[{"name":"MATSUZAKI, Kazutaka","nameLang":"en"}]}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"中央大学国際情報学部"}]},"item_10002_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"この資料の著作権は、資料の著作者または学校法人中央大学に帰属します。著作権法が定める私的利用・引用を超える使用を希望される場合には、掲載誌発行部局へお問い合わせください。"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2435-855X","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"松崎, 和賢"},{"creatorName":"マツザキ, カズタカ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2022-05-06"}],"displaytype":"detail","filename":"2435-855X_2_91-101.pdf","filesize":[{"value":"96.9 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文を見る","url":"https://chuo-u.repo.nii.ac.jp/record/13930/files/2435-855X_2_91-101.pdf"},"version_id":"41a3bf75-9aa6-4908-b88b-a55f9c66f666"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Cyber physical system","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"cyber security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"communication robustness test","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"industrial automation and control system","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"サイバーフィジカルシステムのクラウド型セキュリティ診断を設計する際の課題","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サイバーフィジカルシステムのクラウド型セキュリティ診断を設計する際の課題"},{"subitem_title":"On Challenges in the Cloud-based Security Diagnosis of Cyber-Physical Systems","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"1","path":["921"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-04-01"},"publish_date":"2022-04-01","publish_status":"0","recid":"13930","relation_version_is_last":true,"title":["サイバーフィジカルシステムのクラウド型セキュリティ診断を設計する際の課題"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-15T16:34:52.188927+00:00"}