IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN 2024-01-19
10:00
Aichi   A Weighting Framework for Graph Utilization of Relational Databases
Kotaro Fujii, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.) IN2023-57
In recent years, there has been increasing interest in analyzing data by converting relational databases (RDB) into grap... [more] IN2023-57
pp.46-51
SC 2022-05-27
10:55
Online Online Improving data security by mapping data and storage relations for data management in large environment
Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] SC2022-4
pp.19-24
SWIM 2022-02-18
13:35
Online Online Proposal of Circulatory Data Model between Big Data and Fog Nodes
Tsukasa Kudo, Takehiro Yamamoto, Tomoki Watanabe (SIST) SWIM2021-33
Currently, a large amount of data is published on the cloud as big data. However, since it is not fit for the individual... [more] SWIM2021-33
pp.15-22
ICTSSL 2017-05-29
15:25
Miyagi NEXCO EAST TOHOKU [Special Talk] Smart Maintenance Highway (SMH) project -- Ensuring more efficient Highway maintenance --
Isao Ueda (NEXCO-EAST) ICTSSL2017-6
NEXCO East announced in July 2013 the concept of “Smart Maintenance Highway (SMH)”. For ensuring the long-term safety an... [more] ICTSSL2017-6
pp.27-32
SITE, IPSJ-EIP 2013-05-16
11:25
Kanagawa Institute of Infomation Security Proposal of SNS Membership Qualification System Using Security Information Database
Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] SITE2013-3
pp.11-16
SR 2011-07-28
15:05
Kanagawa YRP [Technology Exhibit] Implementation Issues of Automatic Modulation Classification on Software Defined Radio Platform
Md. Abdur Rahman, Azril Haniz, Minseok Kim, Jun-ichi Takada (Tokyo Inst. of Tech.) SR2011-32
Automatic modulation classification (AMC) is used in many military and civilian applications such as surveillance, spect... [more] SR2011-32
pp.93-100
MSS 2009-01-29
17:25
Kanagawa Kanagawa Industrial Promotion Center Design and Implementation of Secret Sharing Distributed Database System
Shota Minakami, Toshiyuki Miyamoto (Osaka Univ.) CST2008-50
In recent years, database security has attracted attention due to
frequent occurrence of individual information leak.
... [more]
CST2008-50
pp.51-56
DE 2008-09-21
17:00
Fukushima   [Poster Presentation] Securing Social Information in Outsourced Databases
Junpei Kawamoto, Masatoshi Yoshikawa (Kyoto Univ.) DE2008-36
Nowadays, outsourced databases services are in widespread use. In these services, security is more
important than ever ... [more]
DE2008-36
pp.13-14
NS 2007-10-19
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A study on realizing a cost-efficient health information database using DNS
Hidenobu Watanabe, Takayuki Fujino (Kinki Univ) NS2007-89
Japan is an aging society with fewer children now. At the fields of the medical and the welfare, a ubiquitous support en... [more] NS2007-89
pp.51-56
LOIS, IPSJ-DC 2007-07-27
15:25
Hokkaido Future University-Hakodate Database Security Technologies for Internal Control
Yutaka Matsunaga (TED), Michiko Oba (Hitachi)
As the requirements for preventing information leakage and for regulation compliance are getting critical, the security ... [more] OIS2007-25
pp.65-70
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:45
Hokkaido Future University-Hakodate A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] ISEC2007-17 SITE2007-11
pp.7-14
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:00
Hokkaido Future University-Hakodate Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] ISEC2007-25 SITE2007-19
pp.65-70
NS 2007-04-20
10:00
Tokushima   A Secure Distributed Database System with Time-series Data and Social-Relation Based Information Access Control
Masahiro Nagao, Glenn Mansfield Keeni (Cyber Solutions), Masahiro Ishigaki (Tohoku Univ.), Atsushi Togashi (Miyagi Univ.), Shoich Noguchi (Sendai Foundation for Applied Information Sciences) NS2007-10
In this paper, we discuss the implementation of a distributed health
information DB using the Lightweight Directory Ac... [more]
NS2007-10
pp.55-60
LOIS, IPSJ-DC 2006-07-28
14:05
Yamagata Faculty of Engineering Yamagata University Server-side security requirements against the Web technology threats
Yutaka Matsunaga (TEL), Michiko Oba (Hitachi)
The number of the attacks to the Web servers exploiting Web technologies is increasing. These attacks have caused forced... [more] OIS2006-17
pp.47-53
DE 2006-07-12
14:45
Niigata HOTEL SENKEI Security Verification against Attacks using Type Inference on XML Databases
Fumikazu Takasuka, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.)
Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e... [more] DE2006-47
pp.151-156
DE, DC 2005-10-17
16:00
Tokyo NTT Musashino R&D center A Logic-based Approach to Data-Dependent Access Control in RDBMSs
Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori (Gunma Univ.), Cherri M. Pancake (Oregon State Univ.)
We present a data-dependent access control approach to RDBMSs. The approach is based on a logical language that enables ... [more] DE2005-132 DC2005-26
pp.43-48
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan