(¥»¥å·¥ç¥óɽ¤Ø)

¥ޥë¥á¥ǥ£¥¢¡¤ʬ»¶¡¤¶¨Ĵ¤ȥâ¥Х¤¥ë(DICOMO2008)¥·¥ó¥ݥ¸¥¦¥à

¥»¥å·¥ç¥ó 6A  ¥ͥåȥ¥¯¡¦¥»¥­¥å¥ê¥ƥ£(CSEC)
Æü»þ: 2008ǯ7·î10Æü(ÌÚ) 13:50 - 16:00
Éô²°: ¥ݥé¥ꥹ
ºÂĹ: Ãݿ¹ ·Éʹ (KDDI¸¦)

6A-1 (»þ´Ö: 13:50 - 14:15)
Âê̾ ¥ۥ¹¥ȥ١¼¥¹Ä̿®´ƻ륷¥¹¥ƥà¤ˤª¤±¤ë¥¾ðÊó¼ý½¸Êý¼°
Ãø¼Ô *°ð°æ ½Ӳð, ÇòÀÐ ÌÀ (̾¹©Âç), ʡÅÄ Íμ£ (°¦Ãζµ°éÂç), ¹Â޼ ¾¼Æó (¶áÂç), ÌÓÍø ¸øÈþ (´ôÉìÂç)
Page pp. 1243 - 1251
¢ª¾ܺ٥ǡ¼¥¿ (¥¢¥֥¹¥ȥ饯¥ȡ¤¥­¡¼¥¥ɡ¤¾ܺ٤ÊÃø¼Ԥνê°¤ʤÉ)

6A-2 (»þ´Ö: 14:15 - 14:40)
Âê̾ Evanescent Blacklisting for Automated Network Attack Mitigation
Ãø¼Ô *Erwan Le Malecot (Kyushu Univ.), Pascal Jinkoji (Supelec), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Page pp. 1252 - 1257
¢ª¾ܺ٥ǡ¼¥¿ (¥¢¥֥¹¥ȥ饯¥ȡ¤¥­¡¼¥¥ɡ¤¾ܺ٤ÊÃø¼Ԥνê°¤ʤÉ)

6A-3 (»þ´Ö: 14:40 - 15:05)
Âê̾ IPSecÄ̿®¤¬²Äǽ¤ʥ¢¥ɥ쥹ÊѴ¹¤ˤè¤ëIPv6µ¡´ï¤ΰÌÃÖƩ²á¤ʥ¢¥¯¥»¥¹¼êˡ
Ãø¼Ô *¹õÌÚ ½¨Ï (¥æ¥ӥƥå¯/ÀŲ¬Âç), °æ¾å ÇîǷ (¹­Åç»ÔΩÂç), ²®Ìî »Ê (¥æ¥ӥƥå¯), Àи¶ ¿Ê (ÀŲ¬Âç)
Page pp. 1258 - 1265
¢ª¾ܺ٥ǡ¼¥¿ (¥¢¥֥¹¥ȥ饯¥ȡ¤¥­¡¼¥¥ɡ¤¾ܺ٤ÊÃø¼Ԥνê°¤ʤÉ)

6A-4 (»þ´Ö: 15:05 - 15:30)
Âê̾ ¥»¥­¥奢¥ޥ륭¥㥹¥ȤÎÄ̿®Î̸úΨ²½
Ãø¼Ô *°Ëƣ δ, ÊÆÅÄ ·ò (»°ɩÅÅ)
Page pp. 1266 - 1269
¢ª¾ܺ٥ǡ¼¥¿ (¥¢¥֥¹¥ȥ饯¥ȡ¤¥­¡¼¥¥ɡ¤¾ܺ٤ÊÃø¼Ԥνê°¤ʤÉ)

6A-5 (»þ´Ö: 15:30 - 15:55)
Âê̾ ¹½¾ÚÌ¡ǽ¤ò»ý¤ļÖÆâÄ̿®¥ץí¥ȥ³¥ë¤ÎÄó°Æ
Ãø¼Ô *µȲ¬ ¸², ¾®·§ ¼÷, Àî ¿¿ (¥ȥ西IT³«ȯ¥»¥󥿡¼), ÈËÉÙ Íø·Ã, ÂçÄÍ Îè, º£°æ ½¨¼ù (»ºÁ)
Page pp. 1270 - 1275
¢ª¾ܺ٥ǡ¼¥¿ (¥¢¥֥¹¥ȥ饯¥ȡ¤¥­¡¼¥¥ɡ¤¾ܺ٤ÊÃø¼Ԥνê°¤ʤÉ)