IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
DE 2014-06-21
09:05
Tokyo Ricoh IT Solutions A Knowledge Acquisition Method for Decision-making Based on Context Computing
Daisuke Takaoka (PMT), Yasuyuki Jinnouchi (Sumitem), Yasuyuki Sugai (Eagle), Michitaka Aramoto (Ad-Sol), Tomonori Makino (Nihon Unisys), Noriaki Izumi (AIST) DE2014-1
This report provides a reference architecture about Context Computing, as a part of AITC’s proposal, which enables us to... [more] DE2014-1
pp.1-6
AI, IPSJ-DC 2008-11-27
10:30
Okinawa   Command line interface and intuitive XML operation
Michitaka Aramoto (Ad-Sol Nissin Corp.)
There is a lot of kinds of XML data as Web service and a data file that exists in on Internet and the enterprise, and th... [more] AI2008-27
pp.19-24
LOIS, IPSJ-DC 2007-07-27
13:50
Hokkaido Future University-Hakodate Problem of policy transmission in End-to-End security
Michitaka Aramoto (Ad-Sol Nissin)
In the Web service call, security in the message layer has been achieved by WS-Security. There is a specification named ... [more] OIS2007-23
pp.53-58
LOIS, IPSJ-DC 2006-07-28
13:15
Yamagata Faculty of Engineering Yamagata University Proposal of Schema Validation Method for Encrypted XML Data
Kojiro Nakayama (Hitachi), Michitaka Aramoto (Ad-Sol Nissin), Michiko Oba (Hitachi)
XML Security is necessary to ensure the end-to-end security of web services. To provide the confidentiality against the ... [more] OIS2006-15
pp.31-37
LOIS, IPSJ-DC 2006-07-28
13:40
Yamagata Faculty of Engineering Yamagata University Implementation of Schema Validation Mechanism Using XSLT for Encrypted XML Data
Michitaka Aramoto (Ad-Sol Nissin), Kojiro Nakayama, Michiko Oba (Hitachi)
The XML data from which the part is encrypted cannot perform of the schema verification because validity to the schema i... [more] OIS2006-16
pp.39-45
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan