{"id":"https://openalex.org/W4385532461","doi":"https://doi.org/10.1109/sera57763.2023.10197716","title":"Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model","display_name":"Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4385532461","doi":"https://doi.org/10.1109/sera57763.2023.10197716"},"language":"en","primary_location":{"id":"doi:10.1109/sera57763.2023.10197716","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sera57763.2023.10197716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052168146","display_name":"Shigeaki Tanimoto","orcid":"https://orcid.org/0000-0002-2291-0959"},"institutions":[{"id":"https://openalex.org/I8488066","display_name":"Chiba Institute of Technology","ror":"https://ror.org/00qwnam72","country_code":"JP","type":"education","lineage":["https://openalex.org/I8488066"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shigeaki Tanimoto","raw_affiliation_strings":["Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan","Faculty of Social System Science, Chiba Institute of Technology, Narashino, Japan"],"affiliations":[{"raw_affiliation_string":"Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan","institution_ids":["https://openalex.org/I8488066"]},{"raw_affiliation_string":"Faculty of Social System Science, Chiba Institute of Technology, Narashino, Japan","institution_ids":["https://openalex.org/I8488066"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101230507","display_name":"Sogen Hori","orcid":null},"institutions":[{"id":"https://openalex.org/I8488066","display_name":"Chiba Institute of Technology","ror":"https://ror.org/00qwnam72","country_code":"JP","type":"education","lineage":["https://openalex.org/I8488066"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Sogen Hori","raw_affiliation_strings":["Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan","Faculty of Social System Science, Chiba Institute of Technology, Narashino, Japan"],"affiliations":[{"raw_affiliation_string":"Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan","institution_ids":["https://openalex.org/I8488066"]},{"raw_affiliation_string":"Faculty of Social System Science, Chiba Institute of Technology, Narashino, Japan","institution_ids":["https://openalex.org/I8488066"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060858053","display_name":"Hiroyuki Sat\u014d","orcid":"https://orcid.org/0000-0002-2891-3835"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroyuki Sato","raw_affiliation_strings":["The University of Tokyo,Information Technology Center,Tokyo,Japan","Information Technology Center, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo,Information Technology Center,Tokyo,Japan","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"Information Technology Center, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113866482","display_name":"Atsushi Kanai","orcid":null},"institutions":[{"id":"https://openalex.org/I204291657","display_name":"Hosei University","ror":"https://ror.org/00bx6dj65","country_code":"JP","type":"education","lineage":["https://openalex.org/I204291657"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Atsushi Kanai","raw_affiliation_strings":["Hosei University,Faculty of Science and Engineering,Koganei,Japan","Faculty of Science and Engineering, Hosei University, Koganei, Japan"],"affiliations":[{"raw_affiliation_string":"Hosei University,Faculty of Science and Engineering,Koganei,Japan","institution_ids":["https://openalex.org/I204291657"]},{"raw_affiliation_string":"Faculty of Science and Engineering, Hosei University, Koganei, Japan","institution_ids":["https://openalex.org/I204291657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052168146"],"corresponding_institution_ids":["https://openalex.org/I8488066"],"apc_list":null,"apc_paid":null,"fwci":0.6019,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67915573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"34","issue":null,"first_page":"440","last_page":"445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.882756233215332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7459758520126343},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6325116157531738},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5573604106903076},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.52424556016922},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4992387294769287},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4917302429676056},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43841463327407837},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.41415935754776},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3475777804851532},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.25677359104156494},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13550475239753723},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.09138011932373047}],"concepts":[{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.882756233215332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7459758520126343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6325116157531738},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5573604106903076},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.52424556016922},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4992387294769287},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4917302429676056},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43841463327407837},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.41415935754776},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3475777804851532},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25677359104156494},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13550475239753723},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.09138011932373047},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sera57763.2023.10197716","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sera57763.2023.10197716","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2972272611","https://openalex.org/W2979657369","https://openalex.org/W3014087345","https://openalex.org/W3093665612","https://openalex.org/W4290998492","https://openalex.org/W4296338017","https://openalex.org/W4317419057"],"related_works":["https://openalex.org/W2953205341","https://openalex.org/W2092643327","https://openalex.org/W235065745","https://openalex.org/W2029935773","https://openalex.org/W2787754950","https://openalex.org/W1572215850","https://openalex.org/W1985775355","https://openalex.org/W2352115286","https://openalex.org/W4256172809","https://openalex.org/W10199086"],"abstract_inverted_index":{"Telework":[0],"has":[1],"been":[2],"on":[3],"the":[4,7,59,74,93,113,126,159,162,170,173,178],"rise":[5],"since":[6],"advent":[8],"of":[9,58,76,117,140,155,161,172],"COVID-19,":[10],"and":[11,42,50,129,137,176,182],"concerns":[12],"have":[13,63,83],"arisen":[14],"about":[15],"issues":[16],"such":[17],"as":[18,31,100,119],"information":[19],"leakage":[20],"due":[21,72],"to":[22,46,73,106,169],"internal":[23],"fraud.":[24],"The":[25,153],"zero-trust":[26,98,108,174],"model":[27,35,99,175],"is":[28],"attracting":[29],"attention":[30],"a":[32,86,101],"countermeasure.":[33],"This":[34],"reduces":[36],"risk":[37],"by":[38],"constantly":[39],"performing":[40],"authentication":[41],"authorization,":[43],"thus":[44],"leading":[45],"improved":[47],"security":[48,69,87],"levels":[49],"safer":[51,181],"operation.":[52],"However,":[53],"currently":[54],"less":[55],"than":[56],"40%":[57],"companies":[60],"in":[61,134],"Japan":[62],"introduced":[64],"zero":[65],"trust":[66],"into":[67],"their":[68],"policies,":[70],"mainly":[71],"lack":[75],"specific":[77],"guidelines":[78],"for":[79,92,138,151,180],"operational":[80,103],"management.":[81],"We":[82],"therefore":[84],"developed":[85],"policy":[88],"(service":[89],"authorization":[90,149],"conditions)":[91],"software":[94],"defined":[95],"perimeter":[96],"(SDP)":[97],"universal":[102],"management":[104],"method":[105],"promote":[107],"implementation.":[109],"Specifically,":[110],"we":[111,144],"simplify":[112],"time/place/occasion":[114],"(TPO)":[115],"conditions":[116,150],"users":[118],"T":[120],"(inside/outside":[121,125],"working":[122],"hours),":[123],"P":[124],"company,":[127],"telework),":[128],"O":[130],"(with/without":[131],"visitors),":[132],"resulting":[133],"12":[135],"patterns,":[136],"each":[139],"these":[141],"TPO":[142],"conditions,":[143],"propose":[145],"detailed":[146],"new":[147],"service":[148],"SDP.":[152],"results":[154],"qualitative":[156],"evaluation":[157],"demonstrated":[158],"effectiveness":[160],"proposed":[163],"method.":[164],"Our":[165],"findings":[166],"will":[167],"contribute":[168],"introduction":[171],"pave":[177],"way":[179],"more":[183],"secure":[184],"corporate":[185],"networks.":[186]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
