{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1390001205223981056.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.2197/ipsjdc.3.320"}},{"identifier":{"@type":"URI","@value":"http://www.jstage.jst.go.jp/article/ipsjdc/3/0/3_0_320/_pdf"}},{"identifier":{"@type":"NAID","@value":"130000022252"}}],"dc:title":[{"@language":"en","@value":"Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems"}],"dc:language":"en","description":[{"type":"abstract","notation":[{"@language":"en","@value":"Existing cryptography-based algorithms for multi-party computation problems (MPCP) are either too complex to be used practically or applicable only to the specific applications for which they have been developed. In addition, traditional (non-cryptography-based)algorithms do not provide good privacy protection for MPCPs. This paper presents the security system design, intuitive analysis, and empirical evaluation of an agent server platform for protecting privacy in solving multi-party computation problems with traditional algorithms. We have devised the security policies for an agent server platform and showed how the enforcement of those policies can effectively protect privacy while solving many MPCPs. Experimental analysis shows that the presented agent platform security system can significantly enhance privacy protection while solving the problems with traditional algorithms."}],"abstractLicenseFlag":"disallow"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1420845751166098432","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"80332154"},{"@type":"NRID","@value":"1000080332154"},{"@type":"NRID","@value":"9000006916573"},{"@type":"NRID","@value":"9000017409486"},{"@type":"NRID","@value":"9000245915657"},{"@type":"NRID","@value":"9000004887201"},{"@type":"NRID","@value":"9000259867488"},{"@type":"NRID","@value":"9000242877011"},{"@type":"NRID","@value":"9000046257236"},{"@type":"NRID","@value":"9000242866863"},{"@type":"NRID","@value":"9000240074070"},{"@type":"NRID","@value":"9000016260673"},{"@type":"NRID","@value":"9000006727172"},{"@type":"NRID","@value":"9000259867975"},{"@type":"NRID","@value":"9000290550911"},{"@type":"NRID","@value":"9000020736789"},{"@type":"NRID","@value":"9000240236691"},{"@type":"NRID","@value":"9000415180076"},{"@type":"NRID","@value":"9000415164248"},{"@type":"NRID","@value":"9000238476458"},{"@type":"NRID","@value":"9000004888354"},{"@type":"NRID","@value":"9000259867970"},{"@type":"NRID","@value":"9000270899004"},{"@type":"NRID","@value":"9000283336231"},{"@type":"NRID","@value":"9000016916857"},{"@type":"NRID","@value":"9000021477803"},{"@type":"NRID","@value":"9000018630366"},{"@type":"NRID","@value":"9000259839353"},{"@type":"NRID","@value":"9000283913915"},{"@type":"NRID","@value":"9000259867527"},{"@type":"NRID","@value":"9000270899071"},{"@type":"NRID","@value":"9000382648415"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/shigeki"}],"foaf:name":[{"@language":"en","@value":"Yamada Shigeki"}],"jpcoar:affiliationName":[{"@language":"en","@value":"National Institute of Informatics"}]},{"@id":"https://cir.nii.ac.jp/crid/1410001205223981058","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000020736782"}],"foaf:name":[{"@language":"en","@value":"Huda Md. Nurul"}],"jpcoar:affiliationName":[{"@language":"en","@value":"University of Dhaka"}]},{"@id":"https://cir.nii.ac.jp/crid/1420564276179297408","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"90311175"},{"@type":"NRID","@value":"1000090311175"},{"@type":"NRID","@value":"9000019135257"},{"@type":"NRID","@value":"9000317125202"},{"@type":"NRID","@value":"9000318559010"},{"@type":"NRID","@value":"9000018327544"},{"@type":"NRID","@value":"9000244016527"},{"@type":"NRID","@value":"9000340444712"},{"@type":"NRID","@value":"9000281377906"},{"@type":"NRID","@value":"9000242668675"},{"@type":"NRID","@value":"9000018482049"},{"@type":"NRID","@value":"9000242474729"},{"@type":"NRID","@value":"9000305588255"},{"@type":"NRID","@value":"9000243911170"},{"@type":"NRID","@value":"9000369747360"},{"@type":"NRID","@value":"9000241869904"},{"@type":"NRID","@value":"9000004887203"},{"@type":"NRID","@value":"9000019967229"},{"@type":"NRID","@value":"9000279592463"},{"@type":"NRID","@value":"9000340444676"},{"@type":"NRID","@value":"9000018395908"},{"@type":"NRID","@value":"9000046257233"},{"@type":"NRID","@value":"9000018481067"},{"@type":"NRID","@value":"9000017447501"},{"@type":"NRID","@value":"9000279592263"},{"@type":"NRID","@value":"9000242886744"},{"@type":"NRID","@value":"9000240062790"},{"@type":"NRID","@value":"9000241867970"},{"@type":"NRID","@value":"9000018750106"},{"@type":"NRID","@value":"9000301682905"},{"@type":"NRID","@value":"9000243858601"},{"@type":"NRID","@value":"9000238420139"},{"@type":"NRID","@value":"9000238420141"},{"@type":"NRID","@value":"9000304970233"},{"@type":"NRID","@value":"9000396103794"},{"@type":"NRID","@value":"9000241498087"},{"@type":"NRID","@value":"9000316199156"},{"@type":"NRID","@value":"9000382647817"},{"@type":"NRID","@value":"9000018787685"},{"@type":"NRID","@value":"9000017409536"},{"@type":"NRID","@value":"9000272643184"},{"@type":"NRID","@value":"9000272643222"},{"@type":"NRID","@value":"9000242886746"},{"@type":"NRID","@value":"9000345259927"},{"@type":"NRID","@value":"9000241867598"},{"@type":"NRID","@value":"9000107318741"},{"@type":"NRID","@value":"9000004882471"},{"@type":"NRID","@value":"9000315140828"},{"@type":"NRID","@value":"9000315140709"},{"@type":"NRID","@value":"9000020736786"},{"@type":"NRID","@value":"9000242876971"},{"@type":"NRID","@value":"9000282419147"},{"@type":"NRID","@value":"9000241870202"},{"@type":"NRID","@value":"9000388453199"},{"@type":"NRID","@value":"9000415180075"},{"@type":"NRID","@value":"9000006099049"},{"@type":"NRID","@value":"9000314075559"},{"@type":"NRID","@value":"9000241870428"},{"@type":"NRID","@value":"9000018726613"},{"@type":"NRID","@value":"9000242474461"},{"@type":"NRID","@value":"9000305588234"},{"@type":"NRID","@value":"9000019072882"},{"@type":"NRID","@value":"9000412420017"},{"@type":"NRID","@value":"9000412419869"},{"@type":"NRID","@value":"9000316197227"},{"@type":"NRID","@value":"9000382648251"},{"@type":"NRID","@value":"9000414378729"},{"@type":"NRID","@value":"9000241499193"},{"@type":"NRID","@value":"9000335185272"},{"@type":"NRID","@value":"9000398644395"},{"@type":"NRID","@value":"9000021477797"},{"@type":"NRID","@value":"9000301684265"},{"@type":"NRID","@value":"9000290550822"},{"@type":"NRID","@value":"9000018481924"},{"@type":"NRID","@value":"9000018481029"},{"@type":"NRID","@value":"9000018726632"},{"@type":"NRID","@value":"9000017447496"},{"@type":"NRID","@value":"9000238420137"},{"@type":"NRID","@value":"9000304694062"},{"@type":"NRID","@value":"9000241867568"},{"@type":"NRID","@value":"9000107319125"},{"@type":"NRID","@value":"9000242474672"},{"@type":"NRID","@value":"9000238420146"},{"@type":"NRID","@value":"9000347538425"},{"@type":"NRID","@value":"9000241869930"},{"@type":"NRID","@value":"9000018567390"},{"@type":"NRID","@value":"9000242474657"},{"@type":"NRID","@value":"9000241867792"},{"@type":"NRID","@value":"9000060468746"},{"@type":"NRID","@value":"9000272643120"},{"@type":"NRID","@value":"9000238420144"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/momuc"}],"foaf:name":[{"@language":"en","@value":"Kamioka Eiji"}],"jpcoar:affiliationName":[{"@language":"en","@value":"Shibaura Institute of Technology"},{"@language":"en","@value":"National Institute of Informatics"}]}],"publication":{"publicationIdentifier":[{"@type":"EISSN","@value":"13497456"},{"@type":"LISSN","@value":"13497456"}],"prism:publicationName":[{"@language":"en","@value":"IPSJ Digital Courier"},{"@language":"en","@value":"ipsjdc"}],"dc:publisher":[{"@language":"en","@value":"Information Processing Society of Japan"},{"@language":"ja","@value":"一般社団法人 情報処理学会"}],"prism:publicationDate":"2007","prism:volume":"3","prism:startingPage":"320","prism:endingPage":"331"},"reviewed":"false","dcterms:accessRights":"http://purl.org/coar/access_right/c_abf2","url":[{"@id":"http://www.jstage.jst.go.jp/article/ipsjdc/3/0/3_0_320/_pdf"}],"availableAt":"2007","foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=General%20Economics,%20Econometrics%20and%20Finance","dc:title":"General Economics, Econometrics and Finance"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360845538970728832","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Adopt: asynchronous distributed constraint optimization with quality guarantees"}]},{"@id":"https://cir.nii.ac.jp/crid/1360855569212577024","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information"}]},{"@id":"https://cir.nii.ac.jp/crid/1360855570105899136","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Protocols for secure computations"}]},{"@id":"https://cir.nii.ac.jp/crid/1361137043676993024","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Four Ways to Improve Security"}]},{"@id":"https://cir.nii.ac.jp/crid/1361137043777883648","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Reliability of Computer Systems and Networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1361418518862873216","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"An Efficient and Privacy-Aware Meeting Scheduling Scheme Using Common Computational Space"}]},{"@id":"https://cir.nii.ac.jp/crid/1362825894714694272","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Impact of problem centralization in distributed constraint optimization algorithms"}]},{"@id":"https://cir.nii.ac.jp/crid/1364233270046169344","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"A practical approach to identifying storage and timing channels: twenty years later"}]}],"dataSourceIdentifier":[{"@type":"JALC","@value":"oai:japanlinkcenter.org:0029431670"},{"@type":"CROSSREF","@value":"10.2197/ipsjdc.3.320"},{"@type":"CIA","@value":"130000022252"},{"@type":"OPENAIRE","@value":"doi_dedup___::a0dd6979ea41f2a710efb174d3862bb9"}]}