PDF File - Wideプロジェクト

第 XXXV 部
付録
参考文献
参考文献
[1] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, and Ed. Extensible Authentication
Protocol (EAP). RFC 3748, June 2004.
[2] F. Adler. Minimum energy cost of an observation. IEEE Transactions on Information Theory,
Vol. 1, No. 3, pp. 28–32, 1955. IRE Transactions on Information Theory.
[3] AI3: Asia Internet Interconnection Initiatives. http://www.ai3.net/.
[4] Altera Corporation, December 2010. http://www.altera.com/.
[5] R. Ando. Parallel Analysis of Polymorphic Viral Code Using Automated Deduction System. In
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2007.
[6] AnyBed: a testbed-independent topology configuration tool.
http://sourceforge.net/projects/anybed/
[7] H. Asai, K. Fukuda, and H. Esaki. Towards Characterization of Wireless Traffic in Coexisting
802.11a/g and 802.11n Network. In ACM CoNEXT 2010 Student Workshop, pp. 1:1–1:2.
[8] A.B. Ashfaq, M. Javed, S.A. Khayam, and H. Radha. An information-theoretic combining method
for multi-classifier anomaly detection systems. ICC ’10, p. 5, 2010.
[9] A. Aspuru-Guzik, A.D. Dutoi, P.J. Love, and M. Head-Gordon. Simulated quantum computation
of molecular energies. Science, Vol. 309, pp. 1704–1707, 2005.
[10] D. Bacon and W. van Dam. Recent progress in quantum algorithms. Commun. ACM, Vol. 53,
No. 2, pp. 84–93, February 2010.
[11] V. Baiamonte, K. Papagiannaki, and G. Iannaccone. Detecting 802.11 wireless hosts from remote
passive observations. In NETWORKING 2007, pp. 356–367.
[12] B. Barak, et al. On the (Im)possibility of Obfuscating Programs. In Proceedings of the 21st Annual
International Cryptology Conference on Advances in Cryptology, 2001.
[13] P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. IMW
’02, pp. 71–82, 2002.
[14] S. Ben Ayed and F. Teraoka. DiamEAP: an Open-Source Diameter EAP Application and Its
Evaluation. In Proceedings of the 16th Asia-Pacific Conference on Communications (APCC 2010),
October–November 2010.
[15] C.H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In
Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179,
IEEE, December 1984.
[16] C.H. Bennett, G. Brassard, C. Crépeau, R. Josza, A. Peres, and W. Wootters. Teleporting an
unknown quantum state via dual classical and EPR channels. Physical Review Letters, Vol. 70,
pp. 1895–1899, 1993.
[17] J.-P. Benzécri. Correspondence Analysis Handbook. Marcel Dekker, New York, 1992.
[18] E. Bernstein and U. Vazirani. Quantum complexity theory. SIAM J. Computing, Vol. 26, No. 5,
pp. 1411–1473, 1997.
305
[19] G. Blanc and Y. Kadobayashi. Towards Real-time JavaScript Deobfuscation for Analysis Purposes.
In Proceedings of the 5th Joint Workshop on Information Security (JWIS 2010), August 2010.
[20] G. Blanc and Y. Kadobayashi. Towards Revealing JavaScript Program Intents using Abstract
Interpretation. In Proceedings of the 6th Asian Internet Engineering Conference (AINTEC 2010),
November 2010.
[21] G. Blanc, H. Hazeyama, and Y. Kadobayashi. Flow Direction Inferring Using BGP Information
Encapsulated in sFlow Packets. In Proceedings of The 2nd Joint Workshop on Information security,
August 2007.
[22] V.D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in
large networks. J. STAT. MECH., 2008.
[23] Bonsai Information Security. moth. http://www.bonsai-sec.com/en/research/moth.php.
[24] P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho. Seven years and one day: Sketching the
evolution of internet traffic. INFOCOM ’09, pp. 711–719, 2009.
[25] D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone
networks using association rules. IMC ’09, pp. 28–34, 2009.
[26] E. Bursztein, et al. Webseclab Security Education Workbench. In Proceedings of the 3rd Workshop
on Cyber Security Experimentation and Test, August 2010.
[27] CAIDA Project. CAIDA Project, AS ranking. http://as-rank.caida.org/.
[28] CAIDA Project. Routeviews Prefix to AS mappings Dataset (pfx2as).
http://www.caida.org/data/routing/routeviews-prefix2as.xml.
[29] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko. Diameter Base Protocol. RFC 3588,
September 2003.
[30] P. Calhoun, G. Zorn, D. Spence, and D. Mitton. Diameter Network Access Server Application.
RFC 4005, August 2005.
[31] R. Cannings, H. Dwidedi, and Z. Lackey. Hacking Exposed Web 2.0: Web 2.0 Security Secrets and
Solutions. McGraw-Hill, 2007.
[32] K. Cho, K. Mitsuya, and A. Kato. Traffic data repository at the WIDE project. In USENIX 2000
Annual Technical Conference: FREENIX Track, pp. 263–270, 2000.
[33] B.-S. Choi and R. Van Meter. Effects of interaction distance on quantum addition circuits. ACM
Journal of Emerging Technologies in Computing Systems, 2011. to appear.
[34] T. Clancy and H. Tschofenig. Extensible Authentication Protocol — Generalized Pre-Shared Key
(EAP-GPSK) Method. RFC 5433, February 2009.
[35] T. Clausen and P. Jacquet. Optimized Link State Routing Protocol (OLSR). RFC 3626 (Experimental), October 2003.
[36] B. Cohen. Incentives Build Robustness in BitTorrent. In Proceedings of the First Workshop on
Economics of Peer-to-Peer Systems, May 2003.
[37] M. Cova, C. Kruegel, and G. Vigna. Detection and Analysis of Drive-by Download Attacks and
Malicious JavaScript Code. In Proceedings of the 19th International WWW Conference, 2010.
[38] C. Craioveanu. Server-side Script Polymorphism: Techniques of Analysis and Defense. In Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008.
[39] W. Deng, P. Zhu, X. Lu, and B. Plattner. On Evaluating BGP Routing Stress Attack. Journal of
Communicasions, Vol. 5, pp. 13–22, January 2010.
[40] V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert. Network Mobility (NEMO) Basic
Support Protocol. RFC3963, January 2005.
306
[41] G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using
sketch and non Gaussian multiresolution statistical detection procedures. SIGCOMM LSAD ’07,
pp. 145–152, 2007.
[42] E. Dijkstra. A note on two problems in connexion with graphs. Numerische Mathematik, Vol. 1,
No. 1, pp. 269–271, 1959.
[43] W. Dür and H. Briegel. Entanglement purification and quantum error correction. Rep. Prog. Phys.,
Vol. 70, pp. 1381–1424, 2007.
[44] W. Dür, H.-J. Briegel, J.I. Cirac, and P. Zoller. Quantum repeaters based on entanglement purification. Physical Review A, Vol. 59, No. 1, pp. 169–181, January 1999.
[45] E. Duros, W. Dabbous, H. Izumiyama, N. Fjuii, and Y. Zhang. A link layer tunneling mechanism
for unidirectional links. RFC 3077, March 2001.
[46] C. Elliott, D. Pearson, and G. Troxel. Quantum cryptography in practice. In Proc. SIGCOMM
2003, ACM, August 2003.
[47] eMule Team. eMule-Project.net, 2002. Available electronically at http://www.www.emule-project.
net/.
[48] P. Eronen, Ed., T. Hiller, and G. Zorn. Diameter Extensible Authentication Protocol (EAP)
Application. RFC 4072, August 2005.
[49] ESIA, JEITIA, KSIA, TSIA, and SIA. International technology roadmap for semiconductors. Technical report, ESIA and JEITIA and KSIA and TSIA and SIA, 2009. http://public.itrs.net/.
[50] M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. Free-Riding and Whitewashing in Peer-toPeer Systems. In Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives
in networked systems, pp. 228–236, September 2004.
[51] R.P. Feynman. Simulating physics with computers. In A.J.G. Hey, ed., Feynman and Computation.
Westview Press, 2002.
[52] S. Floyd and V. Paxson. Difficulties in simulating the internet. IEEE/ACM Trans. Netw., Vol. 9,
No. 4, pp. 392–403, 2001.
[53] R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda. MAWILab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. CoNEXT ’10, 2010.
[54] R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda. Uncovering relations between traffic classifiers
and anomaly detectors via graph theory. In International Workshop on Traffic Monitoring and
Analysis (TMA ’10), pp. 101–114, 2010.
[55] R. Fontugne and K. Fukuda. A Hough-transform-based anomaly detector with an adaptive time
interval. ACM SAC ’11, 2011.
[56] R. Fontugne, Y. Himura, and K. Fukuda. Evaluation of anomaly detection method based on pattern
recognition. IEICE Trans. on Commun., Vol. E93-B, No. 2, pp. 328–335, February 2010.
[57] R. Fontugne, T. Hirotsu, and K. Fukuda. A visualization tool for exploring multi-scale network
traffic anomalies. SPECTS ’09, pp. 274–281, 2009.
[58] R. Fontugne, T. Hirotsu, and K. Fukuda. An image processing approach to traffic anomaly detection. AINTEC ’08, pp. 17–26, 2008.
[59] S. Fortunato. Community detection in graphs. Physics Reports, Vol. 486, No. 3-5, pp. 75–174,
2010.
[60] A.G. Fowler, D.S. Wang, C.D. Hill, T.D. Ladd, R. Van Meter, and L.C.L. Hollenberg. Surface code
quantum communication. Phys. Rev. Lett., Vol. 104, No. 18, p.180503, May 2010.
307
[61] P. Funk and S. Blake-Wilson. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0). RFC 5281, August 2008.
[62] M. Garcia-Martin, Ed., M. Belinchon, M. Pallares-Lopez, C. Canales-Valenzuela, and K. Tammi.
Diameter Session Initiation Protocol (SIP) Application. RFC 4740, November 2006.
[63] J.J. Garrett. Ajax: A New Approach to Web Applications.
http://www.adaptivepath.com/ideas/essays/archives/000385.php, 2005.
[64] C. Grier, S. Tang, and S.T. King. Secure Web Browsing with the OP Web Browser. In Proceedings
of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), May 2008.
[65] A. Guha, S. Krishnamurthi, and T. Jim. Using Static Analysis for Ajax Intrusion Detection. In
Proceedings of the 18th International World Wide Web Conference (WWW 2009), April 2009.
[66] H. Gupta, V.J. Ribeiro, and A. Mahanti. A longitudinal study of small-time scaling behavior of
internet traffic. In Proceedings of NETWORKING 2010, pp. 83–95, 2010.
[67] J. Hagino and K. Yamamoto. An IPv6-to-IPv4 Transport Relay Translator. RFC 3142 (Informational), June 2001.
[68] T. Hardie. Distributing Authoritative Name Servers via Shared Unicast Addresses. RFC 3258,
April 2002.
[69] H. Hazeyama. A brief report of IP traceback experiment with Japan ISPs. APAN 23 Manila,
January 2007.
[70] H. Hazeyama. A trail of traceback system in Interop Tokyo 2008. APAN 26 QueensTown, August
2008.
[71] H. Hazeyama. sFlow-based AS Border Traceback. APRICOT 2008 TAIPEI, February 2008.
[72] H. Hazeyama, Y. Kadobayashi, D. Miyamoto, and M. Oe. An autonomous architecture for interdomain traceback across the borders of network operation. In Proceedings of 11th IEEE Symposium
on Computers and Communications (ISCC ’06), pp. 378–385, June 2006.
[73] H. Hazeyama, Y. Kadobayashi, M. Oe, and R. Kaizaki. InterTrack: A federation of IP traceback
systems across borders of network operation domains. In Proceedings of Annual Computer Security
Applications Conference (ACSAC), Technology Blitz Session, December 2005.
[74] H. Hazeyama, Y. Matsumoto, and Y. Kadobayashi. Design of an FDB based Intra-domain Packet
Traceback System. In Proceedings of Second International Workshop on Advances in Information
Security (WAIS) 2008, pp. 1313–1318, March 2008.
[75] H. Hazeyama, Y. Matsumoto, and Y. Kadobayashi. Message Forwarding Strategies for Inter-AS
Packet Traceback Network. In Proceedings of The 2nd Joint Workshop on Information security,
August 2007.
[76] H. Hazeyama, M. Oe, and Y. Kadobayashi. A layer-2 extension to hash-based IP traceback. In
1st International Forum on Information and Computer Technology (IFICT), pp. 94–99, January
2003.
[77] H. Hazeyama, M. Oe, and Y. Kadobayashi. A layer-2 extension to hash-based IP traceback. IEICE
Transactions on Information and Systems, Vol. E86-D, No. 11, pp. 2325–2333, November 2003.
[78] H. Hazeyama, S. Ohta, S. Miwa, T. Miyachi, M. Suzuki, S. Uda, K. Chinen, M. Enomoto,
Y. Kadobayashi, and Y. Shinoda. Emulating over 10K AS topology with massive VM multiplexing.
ACM SIGCOMM 2009, Demo Session, August 2009.
[79] H. Hazeyama, K. Takemori, and K. Wakasa. A Field Trial of Inter-Domain Traceback Operation
in Japan. IETF, February 2010. draft-hazeyama-traceback-field-trial-00.txt (expired).
[80] B. Hoffman and B. Sullivan. Ajax Security. Addison-Wesley (Pearson), 2007.
308
[81] A.T. Holdoner. Ajax: The Definitive Guide. O’Reilly, 2008.
[82] D. Huang, M. Verma, A. Ramachandran, and Z. Zhou. A distributed ePedigree architecture. In
Proceedings of FTDCS 2007, March 2007.
[83] Internet Viewer (Visualize tool for Traceback Log) version 0.0.1.
http://iplab.naist.jp/research/traceback/internet-viewer-0.0.1.tar.gz
[84] Interop Tokyo 2009 クラウドコンピューティングコンペティション.
http://www.interop.jp/pavilion/ccc.html
[85] IPv6 Forum, December 2010. http://www.ipv6forum.org/.
[86] O. Ismail, M. Etoh, Y. Kadobayashi, and S. Yamaguchi. A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. In Proceedings of 18th
International Conference on Advanced Information Networking and Applications (AINA 2004),
March 2004.
[87] C. Jackson and H.J. Wang. Subspace: Secure Cross-Domain Communication for Web Mashups. In
Proceedings of the 16th International World Wide Web Conference (WWW 2007), May 2007.
[88] Japan Data Communication Association. Traceback Research Portal.
https://www.telecom-isac.jp/tb/index e.html.
[89] T. Jim, N. Swamy, and M. Hicks. BEEP: Browser-Enforced Embedded Policies. In Proceedings of
the 16th International World Wide Web Conference (WWW 2007), May 2007.
[90] M. Johns. On JavaScript Malware and Related Threats. Journal in Computer Virology, Vol. 4,
No. 3, pp. 161–178, August 2008.
[91] M. Johns and J. Winter. RequestRodeo: Client Side Protection against Session Riding. In Proceedings of the OWASP Europe 2006 Conference, May 2006.
[92] D.B. Johnson, C.E. Perkins, and J. Arkko. Mobility Support in IPv6. RFC3775, June 2004.
[93] F. Kaashoek and D.R. Karger. Koorde: A simple degree-optimal distributed hash table. In 2nd
International Workshop on Peer-to-Peer Systems, February 2003.
[94] Y. Kadobayashi. Current status of traceback research in Japan. In 1st China Japan Korea. Standardization Workshop on Information Security, October 2007.
[95] Y. Kanda, K. Fukuda, and T. Sugawara. An evaluation of anomaly detection based on sketch and
PCA. GLOBECOM ’10, 2010.
[96] T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido. A nonstationary Poisson view of internet
traffic. In INFOCOM ’04, 2004.
[97] G.M. Keeni, K. Koide, S. Gundavelli, and R. Wakikawa. Proxy Mobile IPv6 Management Information Base. Work in progress, August 20, 2010.
http://www.ietf.org/id/draft-ietf-netlmm-pmipv6-mib-03.txt.
[98] F. De Keukelaere, S. Bhola, M. Steiner, S. Chari, and S. Yoshihama. SMash: Secure Component
Model for Cross-Domain Mashups on Unmodified Browsers. In Proceedings of the 17th International
World Wide Web Conference (WWW 2008), April 2008.
[99] H.-C. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet traffic classification demystified: Myths, caveats, and the best practices. CoNEXT ’08, 2008.
[100] H. Kristian and S. Adinugroho. Internal Report on “Live Streaming HD + 5.1Audio over Network”,
November 17th , 2010.
[101] L.I. Kuncheva. Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience, 2004.
[102] KVM. http://linux-kvm.org/
309
[103] R. Landauer. Irreversibility and heat generation in the computing process. IBM J. of Research
and Development, Vol. 5, No. 3, pp. 183–191, 1961. reprinted in IBM J. R.&D. Vol. 44 No. 1/2,
January/March 2000, pp. 261–269.
[104] R. Landauer. Energy needed to send a bit. Proceedings: Mathematical, Physical and Engineering
Sciences, Vol. 454, No. 1969, pp. 305–311, 1998.
[105] X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and
identification of network anomalies using sketch subspaces. IMC ’06, pp. 147–152, 2006.
[106] R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das. The 1999 DARPA off-line intrusion
detection evaluation. Computer Networks, Vol. 34, No. 4, pp. 579–595, 2000.
[107] H.-K. Lo and Y. Zhao. Quantum cryptography. In Encyclopedia of Complexity and System Science.
Springer, 2008. arXiv:0803.2507v4 [quant-ph].
[108] G. Louthan, W. Roberts, M. Butler, and J. Hale. The Blunderdome: An Offensive Exercise for
Building Network, Systems, and Web Security Awareness. In Proceedings of the 3rd Workshop on
Cyber Security Experimentation and Test, August 2010.
[109] W. Lu and M.-Y. Kan. Supervised Categorization of JavaScript using Program Analysis Features.
In Asian Information Retrieval Symposium, Springer-Verlag, 2005.
[110] S. Maffeis and A. Taly. Language-Based Isolation of Untrusted JavaScript. In Proceedings of the
22nd IEEE Computer Security Foundations Symposium, 2009.
[111] D. Malkhi, M. Naor, and D. Ratajczak. Viceroy: A scalable and dynamic emulation of the butterfly.
In 21st Annual Symposium on Principles of distributed computing, July 2002.
[112] R.A. Martin. Making security measurable and manageable. CrossTalk — The Journal of Defense
Software Engineering, pp. 26–32, 2009.
[113] N. Matsuhira. Stateless Automatic IPv4 over IPv6 Tunneling: Global SA46T Address Format.
February 2010. http://tools.ietf.org/html/draft-matsuhira-sa46t-gaddr-00
[114] N. Matsuhira. Stateless Automatic IPv4 over IPv6 Tunneling: Specification. February 2010.
http://tools.ietf.org/html/draft-matsuhira-sa46t-spec-00
[115] N. Matsuhira. Stateless automatic IPv4 over IPv6 Tunneling (SA46T). March 2010.
http://www.ietf.org/proceedings/77/slides/v6ops-6.pdf
[116] N. Matsuhira. Stateless automatic IPv4 over IPv6 Tunneling (SA46T). March 2010.
http://www.ietf.org/proceedings/78/slides/softwire-10.pdf
[117] N. Matsuhira. Applicability of Stateless automatic IPv4 over IPv6 Tunneling (SA46T). July 2010.
http://tools.ietf.org/html/draft-matsuhira-sa46t-applicability-00
[118] N. Matsuhira. Stateless Automatic IPv4 over IPv6 Tunneling:
Specification. July 2010.
http://tools.ietf.org/html/draft-matsuhira-sa46t-spec-01
[119] N. Matsuhira. Stateless Automatic IPv4 over IPv6 Tunneling with IPv4 Address Sharing. October
2010. http://tools.ietf.org/html/draft-matsuhira-sa46t-as-00
[120] N. Matsuhira. sa46t and sa46t-as. November 2010.
http://www.ietf.org/proceedings/78/slides/softwire-10.pdf
[121] Y. Matsumoto, H. Hazeyama, and Y. Kadobayashi. Adaptive bloom filter: Space efficient counting
algorithm for unpredictable network traffic. IEICE Transactions on Information and Systems,
Vol. E91-D, No. 5, May 2008.
[122] MAWILab. http://www.fukuda-lab.org/mawilab/.
[123] P. Maymounkov and D. Mazières. Kademlia: A Peer-to-peer Information System Based on the
XOR Metric. In Proceedings of IPTPS02, LNCS 2429, Springer, March 2002.
310
[124] W. McCune. Otter: An Automated Deduction System. http://www.cs.unm.edu/~mccune/otter/.
[125] J. Mchugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion
detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur.,
Vol. 3, No. 4, pp. 262–294, 2000.
[126] MeCab: Yet another part-of-speech and morphological analyzer.
http://mecab.sourceforge.net/.
[127] C.J. Merz. Using correspondence analysis to combine classifiers. Mach. Learn., Vol. 36, No. 1-2,
pp. 33–58, 1999.
[128] S. Miwa, M. Suzuki, H. Hazeyama, S. Uda, T. Miyachi, Y. Kadobayashi, and Y. Shinoda. Experiences in emulating 10K AS topology with massive VM multiplexing. In Proceedings of The First
ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA 2009),
August 2009.
[129] T. Miyachi, S. Miwa, and Y. Shinoda. XBurner: A XENebula-based Native Traffic-generation
Platform. In Proceedings of 6th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom2010), Poster, May 2010.
wide-paper-deepspace1-tridentcom2010-00.txt
[130] D. Miyamoto, H. Hazeyama, and Y. Kadobayashi. A Comparative Evaluation of Traceability in
CJK Internet. In Proceedings of the 4th Joint Workshop on Information Security (JWIS 2009),
August 2009.
[131] G.E. Moore. Cramming more components onto integrated circuits. Electronics, Vol. 38, No. 8,
April 1965.
[132] M. Mosca. Quantum algorithms. Arxiv preprint arXiv:0808.0369, 2008.
[133] A. Moshchuk, T. Bragin, D. Deville, S.D. Gribble, and H.M. Levy. SpyProxy: Execution-based
Detection of Malicious Web Content. In Proceedings of the 16th Annual USENIX Security Symposium, 2007.
[134] J. Moy. OSPF version 2. RFC 2178, July 1997.
[135] W.J. Munro, R. Van Meter, S.G.R. Louis, and K. Nemoto. High-bandwidth hybrid quantum
repeater. Phys. Rev. Lett., Vol. 101, No. 4, p.040502, July 2008.
[136] S. Nagayama and R. Van Meter. IKE for IPsec with QKD. Internet Draft, draft-nagayamaipsecme-ipsec-with-qkd-00; expires April 22, 2010, October 2009.
[137] Nara Institute of Scienece and Technology. IP Traceback: A mechanism to find attack paths.
http://intertrack.naist.jp/.
[138] NetFPGA. NetFPGA, December 2010. http://netfpga.org/.
[139] M.A. Nielsen and I.L. Chuang. Quantum Computation and Quantum Information. Cambridge
University Press, 2000.
[140] G. Nychis, V. Sekar, D.G. Andersen, H. Kim, and H. Zhang. An empirical evaluation of entropybased traffic anomaly detection. IMC ’08, pp. 151–156, 2008.
[141] M. Oe, Y. Kadobayashi, and S. Yamaguchi. An implementation of a hierachical IP traceback
architecture. In Proceedings of the 2003 International Symposium on Applications and the Internet
(SAINT2003), pp. 250–253, January 2003.
[142] M. Peev, C. Pacher, R. Alleaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert,
E. Diamanti, M. Dianati, J.F. Dynes, S. Fasel, S. Fossier, M. Furst, J.-D. Gautier, O. Gay, N. Gisin,
P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hubel, G. Humer, T. Langer, M. Legre,
R. Lieger, J. Lodewyck, T. Lorunser, N. Lutkenhaus, A. Marhold, T. Matyus, O. Maurhart,
311
L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail,
A.W. Sharpe, A.J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R.T. Thew, Y. Thoma,
A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel, N. Walenta, H. Weier, H. Weinfurter,
I. Wimberger, Z.L. Yuan, H. Zbinden, and A. Zeilinger. The SECOQC quantum key distribution network in Vienna. New Journal of Physics, Vol. 11, No. 7, p.075001, 2009.
[143] L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A blueprint for introducing disruptive technology into the internet. SIGCOMM Comput. Commun. Rev., Vol. 33, No. 1, pp. 59–64, 2003.
[144] C.G. Plaxton, R. Rajaraman, and A.W. Richa. Accessing nearby copies of replicated objects in
a distributed environment. In Proceedings of ACM SPAA, June 1997.
[145] N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost in the Browser:
Analysis of Web-based Malware. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets, April 2007.
[146] Quagga Routing Suite. http://www.quagga.net/
[147] S. Raghavan, et al. Dex: A Semantic-Graph Differencing Tool for Studying Changes in Large Code
Bases. In Proceedings of the 20th IEEE International Conference on Software Maintenance, 2004.
[148] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable
network. In Proceedings ACM SIGCOMM, San Diego, CA, August 2001.
[149] C. Reis, J. Dunagan, H.J. Wang, and O. Dubrovsky. BrowserShield: Vulnerability-Driven Filtering
of Dynamic HTML. In Proceedings of the 7th USENIX Symposium on Operating Systems Design
and Implementation, November 2006.
[150] H. Ringberg, M. Roughan, and J. Rexford. The need for simulation in evaluating anomaly detectors. SIGCOMM Comput. Commun. Rev., Vol. 38, No. 1, pp. 55–59, 2008.
[151] H. Ringberg, A. Soule, J. Rexford, and C. Diot. Sensitivity of PCA for traffic anomaly detection.
SIGMETRICS Perform. Eval. Rev., Vol. 35, No. 1, pp. 109–120, 2007.
[152] A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location and routing for
large-scale peer-to-peer systems. In Proceedings of the 18th IFIP/ACM International Conference
on Distributed Systems Platforms (Middleware 2001), November 2001.
[153] B.I. Rubinstein, B. Nelson, L. Huang, A.D. Joseph, S.-H. Lau, S. Rao, N. Taft, and J.D. Tygar.
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. IMC ’09,
pp. 1–14, 2009.
[154] K. Saito. Peer-to-Peer Money: Free Currency over the Internet. In Proceedings of the Second
International Conference on Human.Society@Internet (HSI 2003), Lecture Notes in Computer
Science 2713, Springer-Verlag, June 2003.
[155] K. Saito, E. Morino, and J. Murai. Incentive-Compatibility in a Distributed Autonomous Currency System. In Proceedings of the Fourth International Workshop on Agents and Peer-to-Peer
Computing (AP2PC 2005), July 2005.
[156] K. Saito, E. Morino, and J. Murai. Multiplication Over Time to Facilitate Peer-to-Peer Barter
Relationships. In Proceedings of the 2nd International Workshop on P2P Data Management, Security and Trust (PDMST ’05), August 2005.
[157] K. Saito, E. Morino, and J. Murai. Reduction Over Time to Facilitate Peer-to-Peer Barter Relationships. IEICE TRANSACTIONS on Information and Systems, Vol. E89-D, No. 1, January
2006.
[158] Y. Sawai, M. Oe, K. Iida, and Y. Kadobayashi. Performance evaluation of inter-domain IP traceback. In IEEE Interntional Conference on Telecommunications (ICT) 2003, February 2003.
312
[159] R.A. Setyawan. Internal Report on “SOI-UNTL Site Setup and Operator Training (June 20, 2010–
July 2, 2010)”.
[160] S. Shanbhag and T. Wolf. Accurate anomaly detection through parallelism. Netwrk. Mag. of Global
Internetwkg., Vol. 23, No. 1, pp. 22–28, 2009.
[161] K. Shima. map646: Mapping between IPv6 and IPv4 and vice versa, December 2010.
https://github.com/keiichishima/map646/.
[162] K. Shima and Y. Sekiya. Network Portability Requirements and Models for Cloud Environment.
IETF, September 2010. draft-shima-clouds-net-portability-reqs-and-models-00.
[163] P.W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In Proc. 35th
Symposium on Foundations of Computer Science, pp. 124–134, IEEE Computer Society Press, Los
Alamitos, CA, 1994.
[164] D. Simon, B. Aboba, and R. Hurst. The EAP-TLS Authentication Protocol. RFC 5216, March
2008.
[165] SpringOS version 1.5. http://www.starbed.org/download/index.html
[166] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and Hari Balakrishnan. Chord: A scalable peerto-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM, August 2001.
[167] M. Suzuki, H. Hazeyama, and Y. Kadobayashi. Expediting experiments across testbeds with
AnyBed: a testbed-independent topology configuration tool. Proceedings of 2nd International
IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of
Networks and Communities (TridentCom), March 2006.
[168] T. Takahashi, Y. Kadobayashi and H. Fujiwara. Ontological approach toward cybersecurity in cloud
computing. International Conference on Security of Information and Networks (SIN), pp. 100–109,
ACM, 2010.
[169] Y. Takano, T. Inoue, K. Chinen, and Y. Shinoda. The Design and Implementation of the libcage
NATProblem Free DHT Library. Computer Software, Vol. 27, No. 4, pp. 4 58–4 76, 2010.
[170] M.L. Tambowon. Creating A Global Community of Support for Students Learning Portuguese in
Timor-Leste. Master’s Thesis, Keio University Graduate School of Media Design, 2010.
[171] M. Tavallaee, E. Bagheri, W. Lu, and A.A. Ghorbani. A detailed analysis of the KDD CUP 99
data set. IEEE international conference on Computational intelligence for security and defense
applications (CISDA ’09), pp. 53–58, 2009.
[172] M. Terada. Proposal of myjvn (web service apis) for security information exchange infrastructure.
21st Annual FIRST Conference, 2009.
[173] The NetBSD Project, December 2010. http://www.netbsd.org/.
[174] P. Thubert, C. Bontoux, and N. Montavont. Nested Nemo Tree Discovery. Internet-Draft, draftthubert-tree-discovery-06.txt, July 2007.
[175] ttylinux. http://minimalinux.org/ttylinux/
[176] Twitter Inc. http://twitter.com/.
[177] R. Van Meter, K.M. Itoh, and T.D. Ladd. Architecture-dependent execution time of Shor’s
algorithm. In Proc. Int. Symp. on Mesoscopic Superconductivity and Spintronics (MS+S2006),
February 2006.
[178] R. Van Meter, T.D. Ladd, A.G. Fowler, and Y. Yamamoto. Distributed quantum computation
architecture using semiconductor nanophotonics. International Journal of Quantum Information,
Vol. 8, pp. 295–323, 2010. preprint available as arXiv:0906.2686v2 [quant-ph].
313
[179] R. Van Meter, T.D. Ladd, W.J. Munro, and K. Nemoto. System design for a long-line quantum
repeater. IEEE/ACM Transactions on Networking, Vol. 17, No. 3, pp. 1002–1013, June 2009.
[180] R. Van Meter, W.J. Munro, K. Nemoto, and K.M. Itoh. Distributed arithmetic on a quantum
multicomputer. In Computer Architecture News, Proc. 33rd Annual International Symposium on
Computer Architecture, pp. 354–365, ACM, June 2006.
[181] R. Van Meter, W.J. Munro, K. Nemoto, and K.M. Itoh. Arithmetic on a distributed-memory
quantum multicomputer. ACM Journal of Emerging Technologies in Computing Systems, Vol. 3,
No. 4, p.17, January 2008.
[182] R. Van Meter and M. Oskin. Architectural implications of quantum computing technologies. ACM
Journal of Emerging Technologies in Computing Systems, Vol. 2, No. 1, pp. 31–63, January 2006.
[183] R. Van Meter, J. Touch, and C. Horsman. Recursive quantum repeater networks. Progress in
Informatics, 2011. to appear.
[184] P. Vogt, et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In
Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS 2007),
February 2007.
[185] K. Wakasa, H. Hazeyama, T. Kai, A. Hashiguchi, M. Yamagata, M. Fujinaga, R. Ohshima, and
T. Shintani. Large Scale Demonstration Experiments Towards Achieving Practical Traceback on
the Internet. In Proceedings of Fourth International Workshop on Advances in Information Security
(WAIS 2010), February 2010.
[186] K. Wakasa, K. Takemori, T. Kai, and H. Hazeyama. Demonstration Experiments Towards Practical
IP Traceback on the Internet. In Proceedings of The 7th Annual IEEE Consumer Communications
and Networiking Conference, (IEEE-CCNC 2010), January 2010.
[187] watsystems.net. WATSystems Home page. Hypertext document. Available electronically at
http://www.watsystems.net/.
[188] W. Wei, B. Wang, C. Zhang, J. Kurose, and D. Towsley. Classification of access network types:
Ethernet, wireless LAN, ADSL, cable modem or dialup?
Comput. Netw., Vol. 52, No. 17,
pp. 3205–3217, 2008.
[189] WIDE project. TAHI project, December 2010. http://www.tahi.org/.
[190] XEN. http://xen.org/
[191] XENebula. http://tbn.starbed.org/XENebula/
[192] Xilinx, Inc., December 2010. http://www.xilinx.com/.
[193] S. Yamaguchi and J. Murai. Asian Internet Interconnection Initiatives. INET 1996, June 1996.
[194] T. Yokoyama, S. Mikawa, J. Takei, K. Cho, S. Yamaguchi, and J. Murai. Overview of AI3 Network:
Design and Applications of Satellite Network. Sigcomm ’07 NSDR Workshop, August 2007.
[195] D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript Instrumentation for Browser Security. In
Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 2007.
[196] B.Y. Zhao, J.D. Kubiatowicz, and A.D. Joseph. Tapestry: An Infrastructure for Fault-tolerant
Wide-area Location and Routing. Technical Report UCB//CSD-01-1141, U.C. Berkeley, April
2001.
[197] 榎本真俊,櫨山寛章,三輪信介,門林雄基.ネットワークエミュレーションテストベッドにおける仮想マシ
ンを用いた資源割り当て問題に関する一考察.電子情報通信学会技術研究報告,IA2009-99,pp. 43–48,
2010 年 3 月.wide-paper-deepspace1-enomoto-IA201003-00.txt
314
[198] 榎本真俊,櫨山寛章,三輪信介,門林雄基,山口英.BGP ネットワークエミュレーションにおける仮想
計算機を用いた大規模実験時の効率的なメモリ割り当て手法の提案.マルチメディア,分散,協調とモ
バイル(DICOMO2010)シンポジウム論文集,pp. 296–303,2010 年 7 月.wide-paper-deepspace1-
enomoto-DICOMO2010-00.txt
[199] 大江将史,門林雄基,山口英.階層型 IP トレースバック機構の実装と検証.電子情報通信学会論文誌,
Vol. J86-B,No. 8,pp. 1486–1493,2003 年 8 月.
[200] 大江将史,門林雄基,山口英.階層型 IP トレースバック機構の提案.電子情報通信学会論文誌,Vol. J85-B,
No. 8,pp. 1313–1322,2002 年 8 月.
[201] 大江将史,櫨山寛章,門林雄基.トレースバックシステムの相互接続アーキテクチャの提案.2005 年
暗号と情報セキュリティシンポジウム予稿集(Vol.III),pp. 1549–1554,2005 年 1 月.
[202] 太田悟史,宮地利幸,三輪信介,櫨山寛章,榎本真俊,篠田陽一.ライブトラフィックを用いた模倣イ
ンターネットの安定性の検証.電子情報通信学会技術研究報告,IA2009-118,pp. 259–264,2010 年
3 月.wide-paper-deepspace1-sota-IA201003-00.txt
[203] 太田悟史,宮地利幸,三輪信介,櫨山寛章,榎本真俊,宮本大輔.ライブトラフィックを用いた模倣イ
ンターネットの特性に関する一考察.マルチメディア,分散,協調とモバイル(DICOMO2010)シン
ポジウム論文集,pp. 314–323,2010 年 7 月.wide-paper-deepspace1-sota-DICOMO2010-00.txt
[204] 梶克彦,河口信夫.indoor.Locky:屋内位置推定のための無線 LAN 情報プラットフォーム.情報処理
学会研究報告,Vol. 2010-MBL-56,No. 1,pp. 1–6,2010 年.
[205] 門林雄基.IP トレースバック・オペレーション H20 実証実験にむけて.Internet Week 2007 The
Internet Operations ワークショップ,2007 年 11 月.
[206] 門林雄基.高精度トレースバック研究開発の現状.情報セキュリティ戦略シンポジウム,2005 年 3 月.
[207] 門林雄基.トレーサブルネットワークの研究開発.QBP ワークショップ 2007,2007 年 11 月.
[208] 門林雄基,大江将史.IP トレースバック技術.情報処理,Vol. 42,No. 12,pp. 1175–1180,2001 年
12 月.
[209] 門林雄基,許先明.IP トレースバックとその応用.JAONG 19 Meeting,2007 年 1 月.
[210] 門林雄基,櫨山寛章.徹底攻略! トレースバック技術.ThinkIT 連載記事 2009 年 2 月特集「セキュリ
ティーのツボ」,2009 年 2 月.
[211] 門林雄基,櫨山寛章,武智洋.IP トレースバック相互接続におけるパケットの秘匿性に関する一考察.
第 2 回情報通信システムセキュリティ時限研究会,2006 年 4 月.
[212] 澤井裕子,大江将史,飯田勝吉,門林雄基.IP トレースバック逆探知パケット方式のトラフィック量
と攻撃経路再構成時間の性能解析.電子情報通信学会技術研究報告,pp. 7–14,2002 年 7 月.
[213] 高橋,門林,藤原.オントロジに基づくクラウドセキュリティの検討.情報通信システムセキュリティ
研究会(ICSS),電子情報通信学会,2010 年.
[214] 土井裕介,若山史郎,石山政浩,尾崎哲,井上淳.10 の 10 乗規模の個品追跡を可能とするトレーサビ
リティシステム向け ID 解決機構.情報処理学会論文誌,Vol. 49,No. 3,2008 年 3 月.
[215] 西浦俊太朗,河口信夫.3 次元仮想空間を用いた多地点ビデオコミュニケーションシステム.情報学ワー
クショップ(WiNF),pp. 343–346,2009 年.
[216] 日本電気株式会社,国立大学法人奈良先端科学技術大学院大学,パナソニック電工株式会社,株式会
社クルウィット,財団法人日本データ通信協会,株式会社 KDDI 研究所.サイバー攻撃源の逆探知シ
ステムの開発と実験に成功∼世界初、広域インターネット環境下で逆探知を実証∼.2009 年 11 月.
http://www.naist.jp/pressrelease/detail j/topics/772/.
[217] 櫨山寛章,大江将史,門林雄基.MAC トレースバック:hash-based IP トレースバック拡張方式の提
案.電子情報通信学会技術研究報告,pp. 1–6,2002 年 7 月.
315
[218] 櫨山寛章,藤原礼征.大規模ネットワークトポロジーのための高速グラフ描画ツールセットの実装.電
子情報通信学会技術研究報告書,IA2010-26,Vol.110,No.170,pp. 55–60,2010 年 8 月.wide-paper-
nerdbox-freaks-hazeyama-ia201008-00.txt.
[219] 櫨山寛章,若狭賢,門林雄基.実証実験に向けた IP トレースバックシステム導入シナリオに関する一
考察.電子情報通信学会技術研究報告,IA2008-14,pp. 25–30,2008 年 7 月.
[220] 藤田迪,梶克彦,河口信夫.Gaussian Mixture Model を用いた無線 LAN 位置推定手法.マルチメディ
ア,分散,協調とモバイル(DICOMO2010)シンポジウム,pp. 944–952,2010 年.
[221] 松本義秀,櫨山寛章,門林雄基.ネットワークトラフィック分析のための iterative bloom filter の提
案.日本ソフトウエア科学会第 8 回インターネットテクノロジーワークショップ(WIT2007)論文集,
pp. 112–118,2007 年 6 月.
[222] 宮北剛己.新しい演劇教育のデザイン
グローバル・シアターの構築を通じて
.慶應義塾大学大
学院メディアデザイン研究科 2010 年度修士論文.
[223] 宮地利幸,中田潤也,知念賢一,ラズバン・ベウラン,三輪信介,岡田崇,三角真,宇多仁,芳炭将,
丹康雄,中川晋一,篠田陽一.StarBED:大規模ネットワーク実証環境.情報処理,第 49 巻,第 1 号,
pp. 57–70,2008 年 1 月.
[224] 宮地利幸,三輪信介,篠田陽一.XBurner:XENebula を利用したトラフィックジェネレータプラット
フォームの設計.第 2 回インターネットと運用技術シンポジウム(IOTS2009),2009 年 12 月.wide-
paper-deepspace1-mya-iots2009-00.txt
[225] 宮地利幸,三輪信介,篠田陽一.XBurner を利用したトラフィック生成.マルチメディア,分散,協調と
モバイル(DICOMO2010)シンポジウム論文集,pp. 304–313,2010 年 7 月.wide-paper-deepspace1-
mya-dicomo2010-01.txt
[226] 宮本大輔,飯村卓司,門林雄基.メール特徴を用いたウィルスメール検知に関する一考察.電子情報通
信学会技術研究報告,ISEC2007,2007 年 7 月.
[227] 宮本大輔,櫨山寛章,門林雄基.Mesh of Trees トポロジにおけるトレースバックメッセージ伝達効率
に関する一考察.電子情報通信学会技術研究報告,信学技報,Vol. 108,No. 223(ISSN 0913-5685),
pp. 19–24,2008 年 9 月.
[228] 三輪信介,宮地利幸,中川岳史,中井浩,太田悟史.クラウドコンピューティング技術の検証環境の構
築と運用について.電子情報通信学会,情報ネットワーク研究会(IN),2010 年 12 月.wide-paper-
deepspace1-danna-IN201012-00.txt
[229] 村越優喜,宮本大輔,櫨山寛章,門林雄基.sFlow を用いた IP トレースバック手法の評価.コンピュー
タセキュリティシンポジウム 2008(CSS 2008),pp. 449–454,2008 年 10 月.
[230] 矢野幹樹,白木敦夫,梶克彦,松原茂樹,河口信夫.ユーザ生成情報を用いた携帯端末上での状況依存型
サービス推薦.マルチメディア,分散,協調とモバイル(DICOMO2010)シンポジウム,pp. 221–228,
2010 年.
[231] 若狭賢,木村道弘,中谷浩茂,甲斐俊文,橋口輝,藤長昌彦,竹森敬祐,門林雄基,櫨山寛章.インター
ネットにおけるトレースバック・システムの ISP 環境への配置と事前実験シナリオの策定.コンピュー
タセキュリティシンポジウム 2008(CSS 2008),pp. 445–460,2008 年 10 月.
[232] 若狭賢,木村道弘,中谷浩茂,甲斐俊文,藤長昌彦,竹森敬祐,門林雄基,櫨山寛章.インターネット
におけるトレースバック・システムの実証実験に至る全体計画案の策定.コンピュータセキュリティシ
ンポジウム 2007(CSS 2007),pp. 465–470,2007 年 11 月.
[233] 若狭賢,山縣昌也,大島龍之介,甲斐俊文,橋口輝,藤長昌彦,竹森敬祐,櫨山寛章,門林雄基.イン
ターネットにおけるトレースバック・システムの ISP 実ネットワークにおける大規模実証実験の紹介.
コンピュータセキュリティシンポジウム 2009(CSS2009),pp. 247–252,2009 年 10 月.
316
執筆者一覧
執筆者一覧
題
Part
1
目
著 者
高度インターネットライブ中継実験
村井純,中村修,大川恵子,
∼ベートーヴェンは凄い∼
重近範行,Achmad Husni Thamrin,
堀場勝広,工藤紀篤,岡田耕司,
Achmad Basuki,松谷健史,
遠峰隆史,前川マルコス貞夫,
宮北剛己,稲田環,中村遼,
横石雄大,中村尚生,五十嵐祐貴,
上野幸杜,長谷部克幸,渋谷雪絵
2
ネットワークおよびソフトウェア技術者・
斉藤賢爾,壇俊光,加藤朗,
研究者連盟
室田朋樹,熊木美世子,森下泰宏,
中村素典,武田圭史
3
インターネットを用いた高等教育環境
大川恵子
4
医療・災害医療現場での情報技術活用技術
奥村貴史,中河清博,前田貴匡
の研究
5
ネットワークトラフィック統計情報の収集
長健二朗,Romain Fontugne
と解析
6
経路情報の解析および次世代経路制御技術
小原泰弘,永見健一
の検討
7
ネットワーク管理とセキュリティ
Glenn Mansfield Keeni,小出和秀,
土井一夫
8
公開鍵証明書を用いた利用者認証技術
木村泰司
9
AAA アーキテクチャの検討および AAA
寺岡文男,Sebastien Decugis,
基盤の構築
Souheil Ben Ayed,中村遼,
石田篤志,厚谷有輝
10
IP トレースバック・システムの研究開発
櫨山寛章
11
サイバーセキュリティ情報交換技法
門林雄基
12
ウェブアプリケーションのセキュリティ技
Gregory Blanc,門林雄基
術の研究
319
13
グループ通信技術の研究開発
村本衛一,河口信夫,中山裕美,
Elisha Abade
14
DNS extension and operation
石原知洋,関谷勇司
environment
15
無線を用いた位置情報プラットフォームの
河口信夫
構築
16
自動車を含むインターネット環境の構築
植原啓介,佐藤雅明,和泉順子
17
環境情報の自律的な生成・流通を可能にす
石塚宏紀,松浦知史,落合秀也,
るインターネット
山内正人,松尾健司,石橋尚武
18
災害時における情報通信基盤の開発
片岡広太郎,植原啓介
19
ネットワーク統計情報の可視化技術
長健二朗,渡辺道和
20
コミュニティ活動支援のためのシステム
奥村貴史,高井一輝,阪本裕介
構築
21
Integrated Distributed Environment
斉藤賢爾
with Overlay Network
22
次世代 IT 運用管理システムの開発
河口信夫
23
大学の学務システム及び類似システムの
小原泰弘,石原知洋
研究
24
JB Project
山本成一,長谷部克幸,三宅喬,
金海好彦,小林和真,江崎浩
25
実ノードを用いた大規模なインターネット
榎本真俊,太田悟史,知念賢一,
シミュレーション環境の構築
櫨山寛章,宮地利幸,宮本大輔,
三輪信介
クラウドコンピューティング基盤の構築と
石橋尚武,岡本慶大,島慶一,
運用
関谷勇司
27
分散型量子計算のネットワーク応用技術
Rodney Van Meter,永山翔太
28
迷惑メール低減に関する技術開発と普及
山本和彦
29
Asian Internet Interconnection
Achmad Basuki,
Initiatives
Achmad Husni Thamrin
26
Dikshie Fauzie,片岡広太郎
Niswar Muhammad,横山輝明
320
30
自家製ネットワーク技術を活用した研究促
島慶一,中野博樹
進活動
31
IX の運用技術
関谷勇司,岡本慶大,中村修,
加藤朗,長谷部克幸,岡本裕子,
田原裕市郎,山本成一,宇多仁,
石原知洋
32
大規模な仮設ネットワークテストベッドの
遠峰隆史,中村遼,杉田毅博,
設計・構築とその運用
田崎創,浅井大史,熊木美世子,
新麗,岡本慶大,片岡広太郎,
波多野敏明,寺岡文男,田原裕市郎,
中村遼
33
M Root DNS サーバの運用
加藤朗,関谷勇司
34
WIDE ネットワークの現状
two members
321
ISSN 1344-9400
WIDE プロジェクト 2010 年度 研究報告書
c 2011 WIDE Project
2011 年 3 月発行 Printed in Japan ISSN 1344-9400
編集発行人
連 絡 先
発 行
製
所
作
:WIDE プロジェクト代表 江崎
:〒252 0882
藤沢市遠藤5322
慶應義塾大学 環境情報学部
村井研究室
TEL
0466 49 3529
FAX
0466 49 1101
[email protected]
E mail
:慶應義塾大学湘南藤沢学会
:株式会社グラム
浩