Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN |
2024-01-19 10:00 |
Aichi |
|
A Weighting Framework for Graph Utilization of Relational Databases Kotaro Fujii, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.) IN2023-57 |
In recent years, there has been increasing interest in analyzing data by converting relational databases (RDB) into grap... [more] |
IN2023-57 pp.46-51 |
SC |
2022-05-27 10:55 |
Online |
Online |
Improving data security by mapping data and storage relations for data management in large environment Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4 |
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] |
SC2022-4 pp.19-24 |
SWIM |
2022-02-18 13:35 |
Online |
Online |
Proposal of Circulatory Data Model between Big Data and Fog Nodes Tsukasa Kudo, Takehiro Yamamoto, Tomoki Watanabe (SIST) SWIM2021-33 |
Currently, a large amount of data is published on the cloud as big data. However, since it is not fit for the individual... [more] |
SWIM2021-33 pp.15-22 |
ICTSSL |
2017-05-29 15:25 |
Miyagi |
NEXCO EAST TOHOKU |
[Special Talk]
Smart Maintenance Highway (SMH) project
-- Ensuring more efficient Highway maintenance -- Isao Ueda (NEXCO-EAST) ICTSSL2017-6 |
NEXCO East announced in July 2013 the concept of “Smart Maintenance Highway (SMH)”. For ensuring the long-term safety an... [more] |
ICTSSL2017-6 pp.27-32 |
SITE, IPSJ-EIP |
2013-05-16 11:25 |
Kanagawa |
Institute of Infomation Security |
Proposal of SNS Membership Qualification System Using Security Information Database Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3 |
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] |
SITE2013-3 pp.11-16 |
SR |
2011-07-28 15:05 |
Kanagawa |
YRP |
[Technology Exhibit]
Implementation Issues of Automatic Modulation Classification on Software Defined Radio Platform Md. Abdur Rahman, Azril Haniz, Minseok Kim, Jun-ichi Takada (Tokyo Inst. of Tech.) SR2011-32 |
Automatic modulation classification (AMC) is used in many military and civilian applications such as surveillance, spect... [more] |
SR2011-32 pp.93-100 |
MSS |
2009-01-29 17:25 |
Kanagawa |
Kanagawa Industrial Promotion Center |
Design and Implementation of Secret Sharing Distributed Database System Shota Minakami, Toshiyuki Miyamoto (Osaka Univ.) CST2008-50 |
In recent years, database security has attracted attention due to
frequent occurrence of individual information leak.
... [more] |
CST2008-50 pp.51-56 |
DE |
2008-09-21 17:00 |
Fukushima |
|
[Poster Presentation]
Securing Social Information in Outsourced Databases Junpei Kawamoto, Masatoshi Yoshikawa (Kyoto Univ.) DE2008-36 |
Nowadays, outsourced databases services are in widespread use. In these services, security is more
important than ever ... [more] |
DE2008-36 pp.13-14 |
NS |
2007-10-19 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study on realizing a cost-efficient health information database using DNS Hidenobu Watanabe, Takayuki Fujino (Kinki Univ) NS2007-89 |
Japan is an aging society with fewer children now. At the fields of the medical and the welfare, a ubiquitous support en... [more] |
NS2007-89 pp.51-56 |
LOIS, IPSJ-DC |
2007-07-27 15:25 |
Hokkaido |
Future University-Hakodate |
Database Security Technologies for Internal Control Yutaka Matsunaga (TED), Michiko Oba (Hitachi) |
As the requirements for preventing information leakage and for regulation compliance are getting critical, the security ... [more] |
OIS2007-25 pp.65-70 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:45 |
Hokkaido |
Future University-Hakodate |
A preference transmission method with information security database systems on the Internet Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11 |
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] |
ISEC2007-17 SITE2007-11 pp.7-14 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:00 |
Hokkaido |
Future University-Hakodate |
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels" Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19 |
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] |
ISEC2007-25 SITE2007-19 pp.65-70 |
NS |
2007-04-20 10:00 |
Tokushima |
|
A Secure Distributed Database System with Time-series Data and Social-Relation Based Information Access Control Masahiro Nagao, Glenn Mansfield Keeni (Cyber Solutions), Masahiro Ishigaki (Tohoku Univ.), Atsushi Togashi (Miyagi Univ.), Shoich Noguchi (Sendai Foundation for Applied Information Sciences) NS2007-10 |
In this paper, we discuss the implementation of a distributed health
information DB using the Lightweight Directory Ac... [more] |
NS2007-10 pp.55-60 |
LOIS, IPSJ-DC |
2006-07-28 14:05 |
Yamagata |
Faculty of Engineering Yamagata University |
Server-side security requirements against the Web technology threats Yutaka Matsunaga (TEL), Michiko Oba (Hitachi) |
The number of the attacks to the Web servers exploiting Web technologies is increasing. These attacks have caused forced... [more] |
OIS2006-17 pp.47-53 |
DE |
2006-07-12 14:45 |
Niigata |
HOTEL SENKEI |
Security Verification against Attacks using Type Inference on XML Databases Fumikazu Takasuka, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e... [more] |
DE2006-47 pp.151-156 |
DE, DC |
2005-10-17 16:00 |
Tokyo |
NTT Musashino R&D center |
A Logic-based Approach to Data-Dependent Access Control in RDBMSs Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori (Gunma Univ.), Cherri M. Pancake (Oregon State Univ.) |
We present a data-dependent access control approach to RDBMSs. The approach is based on a logical language that enables ... [more] |
DE2005-132 DC2005-26 pp.43-48 |