Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |
ICM |
2022-07-07 14:50 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
[Invited Talk]
Zero Trust Architecture and Risk Management Yuki Unno (Fujitsu Research) ICM2022-14 |
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] |
ICM2022-14 pp.21-23 |
SITE, IPSJ-EIP |
2022-06-10 13:40 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Development of Patent Misuse in the U.S.
-- Focusing on the Kimble Case -- Yusuke Tachibana (FIT) SITE2022-10 |
Patent misuse is an unequitable extension of patent rights. When misuse is found, remedies for the patentee are denied. ... [more] |
SITE2022-10 pp.59-63 |
R |
2022-05-28 13:00 |
Online |
Online |
Correlation analysis of reviewer rating trends and trustworthiness on EC site Ryohei Suzuki, Iifan Tyou, Naoto Kiribuchi, Nami Ashizawa (NTT), Kazutoshi Sasahara (Tokyo Tech) R2022-1 |
E-commerce sites have a system to evaluate the reputation of products by the number of stars and reviews. When purchasin... [more] |
R2022-1 pp.1-6 |
SC |
2022-03-11 13:00 |
Online |
EventIn |
[Invited Talk]
Artificial Intelligence (AI) and Trust Related Issues for a Super-smart Society Toshikazu Fukushima (JST) SC2021-40 |
This talk describes the trends and issues in policy and technological development for "Trustworthy AI". As the accuracy ... [more] |
SC2021-40 p.32 |
VLD, HWS [detail] |
2022-03-08 15:20 |
Online |
Online |
Bypassing Isolated Execution on RISC-V Keystone using Fault Injection Shoei Nashimoto, Daisuke Suzuki (Mitsubishi Electric), Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-101 HWS2021-78 |
This paper summarizes an attack and countermeasure against RISC-V Keystone from a paper [1] to be presented at TCHES (IA... [more] |
VLD2021-101 HWS2021-78 pp.141-146 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
A study of a decentralized reputation-based trust evaluation system Iifan Tyou (NTT), Takahito Tanabe, Akinori Matsuo (msi) ICSS2021-78 |
In order to evaluate the reputation of an unknown party, such as a new purchase or new contact, it is common to collect ... [more] |
ICSS2021-78 pp.117-122 |
HCS |
2022-01-28 09:40 |
Online |
Online |
Proposal of an Overtrust Scale of Users in Recommender Systems Aika Tsuchida, Reika Miwa, Yoshinori Hijikata (KGU), Masahiro Hamasaki, Masataka Goto (AIST) HCS2021-43 |
Recommender systems have been used in many online services, and people have been exposed to such recommendations frequen... [more] |
HCS2021-43 pp.1-6 |
NLP |
2021-12-17 11:15 |
Oita |
J:COM Horuto Hall OITA |
Investigation on Distance Between Probability Distributions in Trust Region Policy Optimization Kenta Sugaya, Hidehiro Nakano (Tokyo City Univ.) NLP2021-46 |
In this paper, we propose a method to change Kullback-Leibler Divergence to Jensen-Shannon Divergence that used in Trust... [more] |
NLP2021-46 pp.18-21 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |
CPSY, DC, IPSJ-ARC [detail] |
2021-07-20 14:00 |
Online |
Online |
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone Enclave Lena Yu, Yu Omori, Keiji Kimura (Waseda Univ.) CPSY2021-2 DC2021-2 |
Handling confidential information has become an increasingly important concern among many areas of society. However, cur... [more] |
CPSY2021-2 DC2021-2 pp.7-12 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
HCS |
2021-03-16 15:10 |
Online |
Online |
Free Riders in the Workplace and Judgments Based on First Impression Wataru Komatsuzaki, Sachiko Takagi (Tokiwa Univ.) HCS2020-83 |
(To be available after the conference date) [more] |
HCS2020-83 pp.91-96 |
EMM |
2021-03-04 15:30 |
Online |
Online |
[Invited Talk]
REAL or FAKE Noboru Babaguchi (Osaka Univ.) EMM2020-74 |
Media clones are defined as fake media that is not authentic/real but skillfully fabricated replicas of authentic media.... [more] |
EMM2020-74 pp.40-45 |
CQ (2nd) |
2021-01-21 10:50 |
Online |
Online |
[Invited Lecture]
Communication Based on Trustworthiness in Digital Society Motoshi Horii (Fujitsu Lab.) |
“Communication” does not only refer to data transmission among machines. With the widespread of smart devices and social... [more] |
|
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
SWIM |
2020-11-28 14:10 |
Online |
Online |
Governance and accessment of the use of IT and AI for sustainable development Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8 |
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] |
SWIM2020-8 pp.10-17 |
SWIM |
2020-11-28 14:35 |
Online |
Online |
Success factors on long-term large-scale collaborative research between university and industry
-- Case study on collaboration program with industry in Osaka University -- Koji Nishio (Bunkyo Univ.) SWIM2020-9 |
The purpose of this study is to consider how the long-term large-scale university-industry collaboration worked, and the... [more] |
SWIM2020-9 pp.18-25 |
ISEC |
2020-05-20 15:30 |
Online |
Online |
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11 |
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] |
ISEC2020-11 pp.47-54 |
R |
2019-12-13 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Analysis of trust growth in the human-to-machine system Shinji Yokogawa, Shun Endo (U.E.C.) R2019-50 |
The purpose of this study is to investigate the formation process of human-machine systems, which are expected to be fur... [more] |
R2019-50 pp.1-6 |