Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2013-11-29 13:30 |
Miyagi |
Tohoku Univ. |
The proposal on a vulnerability evaluation method according to information system environment Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35 |
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] |
ISEC2013-69 LOIS2013-35 pp.65-70 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 16:05 |
Hokkaido |
|
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 pp.75-84 |
SITE, IPSJ-EIP |
2013-05-16 11:25 |
Kanagawa |
Institute of Infomation Security |
Proposal of SNS Membership Qualification System Using Security Information Database Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3 |
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] |
SITE2013-3 pp.11-16 |
SITE, IPSJ-EIP |
2013-05-16 13:30 |
Kanagawa |
Institute of Infomation Security |
[Invited Talk]
Property versus Secrecy:
-- Toward A General Theory for Information Law -- Koichiro Hayashi (Institute of Information Security) SITE2013-5 |
[more] |
SITE2013-5 pp.23-28 |
ICSS |
2013-03-25 11:35 |
Kanagawa |
Yokohama National University |
Partially Doubly-Encrypted ID-based Encryption and its Security Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60 |
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] |
ICSS2012-60 pp.19-24 |
NS, IN (Joint) |
2013-03-08 09:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Proposition on Identity Management for Business Users in Cloud Environment Takuma Iwabuchi, Atsuhiro Goto (IISEC) NS2012-259 |
With the recent growth of cloud computing market and with ID life cycle becoming more multifaceted, the importance of ID... [more] |
NS2012-259 pp.547-552 |
NS, IN (Joint) |
2013-03-08 13:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Study of sensor data privacy concern from multiple points of view toward its fully utilizing society Takamichi Aso, Atsuhiro Goto (IISEC) NS2012-284 |
Recently sensor service gets attention. It has some big opportunities because of using of various and large amount of da... [more] |
NS2012-284 pp.693-698 |
NS, IN (Joint) |
2013-03-08 14:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A study of information security exchange srchitecture inter-enterprise Hitoshi Osanai, Atsuhiro Goto (IISEC) NS2012-285 |
In recent years, the leak of personal information and confidential information in government agencies and companies, web... [more] |
NS2012-285 pp.699-704 |
NS, IN (Joint) |
2013-03-08 14:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Android Security Improvement by Visualization of Application Behavior Rika Hayashi, Atsuhiro Goto (IISEC) NS2012-286 |
Android applications which work out of users' intention, "suspicious application", are becoming from "annoying" to "thre... [more] |
NS2012-286 pp.705-710 |
NS, IN (Joint) |
2013-03-08 14:50 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Comparing Malware with Already Analyzed One to Make Static Analysis Efficient Hiroki Hada, Atsuhiro Goto (IISEC) NS2012-287 |
[more] |
NS2012-287 pp.711-716 |
ICSS |
2012-11-22 11:35 |
Hiroshima |
Miyajima Mori-no-Yado |
An analytical study for sensor service provider to keep their use's security Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47 |
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] |
ICSS2012-47 pp.13-18 |
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM (Joint) [detail] |
2012-07-20 11:00 |
Ibaraki |
University Hall, University of Tsukuba |
Location Proof by GPS and WLAN Information Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43 |
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] |
MoMuC2012-18 IE2012-43 pp.43-48 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:30 |
Hokkaido |
|
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
[more] |
ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 pp.175-179 |
ICSS, IA |
2012-06-22 09:00 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Proposed phishing countermeasures based on URL information analysis Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6 |
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] |
IA2012-6 ICSS2012-6 pp.31-36 |
DE |
2012-06-05 13:25 |
Tokyo |
NII、12F Room1208, 1210 |
Supporting Remote Communication by Multi-media Processing based-on the Development Platform "IwaCam"
-- Discussions about the Role of Image and Speech Information for Synchronized Cooking by Two People -- Yoko Yamakata, Atsushi Hashimoto, Takuya Funatomi, Hiromi Hiramatsu (Kyoto Univ.), Hidenori Tsuji (IIT/IISEC), Shinsuke Mori (Kyoto Univ.) DE2012-2 |
(To be available after the conference date) [more] |
DE2012-2 pp.7-12 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
KBSE |
2011-09-21 09:30 |
Overseas |
Ocean Grand Hotel Jeju |
Development of a Software Security Learning Environment Atsuo Hazeyama (TGU), Hiroto Shimizu (IIS) KBSE2011-24 |
Importance for software security technologies has been recognized according to increase of services on the internet. It ... [more] |
KBSE2011-24 pp.1-6 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
AN, MoNA, USN (Joint) |
2011-01-21 10:30 |
Hiroshima |
Hiroshima City University |
Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58 |
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] |
USN2010-58 pp.107-112 |