Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CAS, CS |
2017-02-23 17:05 |
Shiga |
|
[Special Invited Talk]
Cybersecurity for Japan
-- Toward Tokyo 2020 and IoT Era -- Atsuhiro Goto (IISEC) |
[more] |
|
ICSS |
2016-11-25 14:15 |
Kanagawa |
Institute of Information Security |
Study of behavior each malware function from the API calls Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40 |
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] |
ICSS2016-40 pp.9-14 |
ISEC |
2016-09-02 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Bundling Proofs of Knowledge and its Application to Signatures Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39 |
(To be available after the conference date) [more] |
ISEC2016-39 pp.9-14 |
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
KBSE, SS, IPSJ-SE [detail] |
2015-07-23 10:40 |
Hokkaido |
|
Proposal of EMSsec-Common Problem for Security and Privacy Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15 |
[more] |
SS2015-22 KBSE2015-15 pp.69-74 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
ISEC |
2015-05-15 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Path analysis method of anonymous communication system Tor Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3 |
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] |
ISEC2015-3 pp.15-22 |
KBSE |
2015-03-05 15:25 |
Tokyo |
The University of Electro-Communications |
A Case-based Management System for Secure Software Development Using Software Security Knowledge Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57 |
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] |
KBSE2014-57 pp.31-36 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
NS, IN (Joint) |
2015-03-03 14:50 |
Okinawa |
Okinawa Convention Center |
A Study on Monitoring of FlowMod Processing in OpenFlow Networks Kohei Yoshida (Kogakuin Univ), Akihiro Nakao (Tokyo Univ), Masato Oguchi (Ochanomizu Univ), Atsuhiro Goto (IISEC), Shu Yamamoto (Tokyo Univ), Saneyasu Yamaguchi (Kogakuin Univ) NS2014-258 |
Using SDN, network services can be managed by a centralized controllerand their setting can be dynamically modified. How... [more] |
NS2014-258 pp.475-480 |
KBSE |
2015-01-27 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Case base of secure web application development using software security knowledge base Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47 |
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] |
KBSE2014-47 pp.49-54 |
CS, NS, IN (Joint) |
2014-09-12 14:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
The proposal of the privacy protection technique in the network using positional addresses Taichi Aoki (IISEC) NS2014-101 |
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more] |
NS2014-101 pp.129-134 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:35 |
Hokkaido |
San-Refure Hakodate |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 pp.171-179 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65 |
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] |
ICSS2013-65 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
System Security Analysis using Dependency Relationship on Cloud Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93 |
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] |
ICSS2013-93 pp.231-236 |
LOIS |
2014-03-08 15:30 |
Okinawa |
|
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77 |
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] |
LOIS2013-77 pp.137-141 |
ISEC, LOIS |
2013-11-29 13:30 |
Miyagi |
Tohoku Univ. |
The proposal on a vulnerability evaluation method according to information system environment Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35 |
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] |
ISEC2013-69 LOIS2013-35 pp.65-70 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 16:05 |
Hokkaido |
|
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 pp.75-84 |