{"created":"2023-07-25T09:06:23.491262+00:00","id":4612,"links":{},"metadata":{"_buckets":{"deposit":"f764b9f6-365a-4c39-99a1-1ae3c82bc3d4"},"_deposit":{"created_by":3,"id":"4612","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4612"},"status":"published"},"_oai":{"id":"oai:toyama.repo.nii.ac.jp:00004612","sets":["496:556:559:560:613"]},"author_link":["58604","58602","16440","58601","16484"],"item_3_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2002-03","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"11","bibliographicPageStart":"5","bibliographicVolumeNumber":"53","bibliographic_titles":[{"bibliographic_title":"富山大学工学部紀要"}]}]},"item_3_description_15":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_3_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation. This paper proposes a network security model that is composed of security system, security connection and communication, and key management. The model carries out encrypting, decrypting, signature and ensures confidentiality, integrity, authentication and non-repudiation. Finally, the paper analyses the merits of the model. (author abst.)","subitem_description_type":"Abstract"}]},"item_3_description_40":{"attribute_name":"資源タイプ(DSpace)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_3_description_6":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"富山大学工学部紀要 53, 5-11.(2002)","subitem_description_type":"Other"}]},"item_3_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.15099/00004606","subitem_identifier_reg_type":"JaLC"}]},"item_3_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"富山大学工学部"}]},"item_3_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00175872","subitem_source_identifier_type":"NCID"}]},"item_3_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"03871339","subitem_source_identifier_type":"ISSN"}]},"item_3_subject_22":{"attribute_name":"国立国会図書館分類","attribute_value_mlt":[{"subitem_subject":"ZM2","subitem_subject_scheme":"NDLC"}]},"item_3_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"WANG, Jiahai"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"HAN, Fangxi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tang, Zheng"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"TAMURA, Hiroki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ishii, Masahiro"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-02-16"}],"displaytype":"detail","filename":"Kokiyo_53_001_005to011.pdf","filesize":[{"value":"430.9 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"Kokiyo_53_001_005to011.pdf","url":"https://toyama.repo.nii.ac.jp/record/4612/files/Kokiyo_53_001_005to011.pdf"},"version_id":"7e460137-9e40-4e74-9cc6-b73613e4acca"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"information security","subitem_subject_scheme":"Other"},{"subitem_subject":"security connection","subitem_subject_scheme":"Other"},{"subitem_subject":"data transmission","subitem_subject_scheme":"Other"},{"subitem_subject":"key management","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Design and realization of a network security model","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Design and realization of a network security model"}]},"item_type_id":"3","owner":"3","path":["613"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-08-24"},"publish_date":"2012-08-24","publish_status":"0","recid":"4612","relation_version_is_last":true,"title":["Design and realization of a network security model"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-07-25T14:02:12.819695+00:00"}