Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-07 13:30 |
Online |
Online |
Time Efficient Risk Assessment Tool for IoT Systems Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60 |
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] |
ICSS2021-60 p.13 |
ICSS, IPSJ-SPT |
2019-03-07 15:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
An experiment design of security notification to users of IoT devices through dedicated client software Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75 |
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] |
ICSS2018-75 pp.41-46 |
ICSS |
2018-11-21 13:25 |
Kagoshima |
|
Investigation of Security-Related Factors of Satisfactions in Internet Services Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54 |
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] |
ICSS2018-54 pp.7-12 |
IN |
2016-06-16 11:35 |
Shizuoka |
Shizuoka Univ. (Hamamatsu) |
Consideration about deriving the security requisites for secure IoT services Shingo Kashima, Masami Ueno, Takamichi Aso, Toshiyuki Miyazawa (NTT) IN2016-20 |
In recent years, IoT (Internet of Things) is expected to be utilized in various domains such as an equipment for hobby, ... [more] |
IN2016-20 pp.13-18 |
LOIS |
2014-03-08 16:20 |
Okinawa |
|
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
SITE, IPSJ-EIP |
2012-05-16 10:35 |
Tokyo |
NII |
The Questionnaire about an Information Security Measures for the Person in Charge of an Information Security in a Private University Masaru Ogawa (Kobe Gakuin Univ.) SITE2012-3 |
This paper discusses the result of questionnaire about an information security measures for the person in charge of an i... [more] |
SITE2012-3 pp.13-18 |
ICSS |
2012-03-16 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44 |
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] |
ICSS2011-44 pp.31-36 |
LOIS, IE, ITE-ME, IEE-CMN |
2009-09-25 15:50 |
Hiroshima |
Hiroshima Univ. |
The Vulnerability Scanner for Client using Existing Vulnerability Databases Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78 |
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] |
LOIS2009-37 IE2009-78 pp.107-112 |
ICM |
2009-05-28 13:25 |
Kagawa |
Kagawa University |
Security management for university network in distributed environment
-- An Approach of Kagawa University for Security-based Computer Network Management in Distributed Campus Environment -- Kazuyoshi Kawauchi, Kazutoshi Sone, Masahide Kawaguchi, Takanori Doi, Yoshiro Imai, Zengo Furukawa (Kagawa Univ.) ICM2009-2 |
This report presents an approach of security measures for Kagawa University and its results during a few months monitori... [more] |
ICM2009-2 pp.7-10 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. -- Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST) |
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] |
ISEC2008-53 pp.133-138 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] |
ISEC2008-54 pp.139-146 |
CQ |
2004-07-15 15:00 |
Hokkaido |
Kitami Institute of Technology |
[Special Talk]
R&D assignments and activities in National Institute of Information and Communications Technology (NICT)
-- Outline of Information Security Center and the future plan -- Takeshi Tandai (NICT) |
NICT is currently working on security issues in the areas of information and communications, and in January 2004, we est... [more] |
CQ2004-58 p.53 |