Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:40 |
Hokkaido |
Hokkaido Univ. |
Risk estimation of Web service using treatment of privacy information Yu Ichifuji (TRIC), Noboru Sonehara (NII) SITE2011-48 IA2011-98 |
Users have been enjoying many Web services by submitting their personal information. On the other hand, some frauds have... [more] |
SITE2011-48 IA2011-98 pp.191-195 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
SITE, IPSJ-CE |
2011-12-17 15:45 |
Shimane |
|
A study for the change of anonymous nature of data from individuals with development of information processing techniques Soichiro Morishita (Univ. of Tokyo), Hiroshi Yokoi (UEC) SITE2011-29 |
With the improvement of information processing technology, the data which were not considered to be personal data come t... [more] |
SITE2011-29 pp.25-28 |
ISEC, LOIS |
2011-11-15 15:15 |
Osaka |
Osaka Electro-Communication University |
A proposal of Privacy Impact Assessment framework in Japan Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT) ISEC2011-59 LOIS2011-53 |
The computerization of individual information become widespread, and the development of legal systems concerning the pro... [more] |
ISEC2011-59 LOIS2011-53 pp.171-176 |
SITE, IPSJ-EIP |
2011-05-19 11:20 |
Tokyo |
Tokyo Univ. of Science |
A report of the six general principles of privacy against lifelog-based service and their practical status Tomonori Ito (Waseda Univ.), Hideki Yoshii (Softbank Telecom), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ.) SITE2011-4 |
With the development of advanced network equipment and mobile devices, services that use the lifelog (individual’s life ... [more] |
SITE2011-4 pp.17-22 |
IA, SITE, IPSJ-IOT [detail] |
2011-02-28 13:55 |
Kochi |
Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) |
Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88 |
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] |
SITE2010-52 IA2010-88 pp.33-38 |
DE |
2008-12-01 |
Tokyo |
Gakushuin |
[Poster Presentation]
Personal Information Access Control Model with Consideration of Context Change Keisuke Kasai, Yu Suzuki, Kyoji Kawagoe (Ritsumeikan Univ.) DE2008-74 |
A communication system of sharing and exchanging users personal information is demanded in the case of emergencies such ... [more] |
DE2008-74 pp.53-54 |
IN |
2008-02-15 15:25 |
Kagawa |
Kagawa University |
Development of Mobile-phone based Patient-Data Management Support System Masatoshi Kawarasaki, Mitsumasa Etoh, Yusuke Fukumuro (Tsukuba Univ.) IN2007-158 |
This paper reports on the “Mobile-phone based patient-data management support system” currently under development as a m... [more] |
IN2007-158 pp.93-98 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:25 |
Hokkaido |
Future University-Hakodate |
Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.) |
Since the personal information protection law has been in force, a series of accidents relating to personal information ... [more] |
|
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:20 |
Hokkaido |
Future University-Hakodate |
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2007-65 |
In the bidirectional broadcasting service via networks, provider authentication is necessary for secure transmission of ... [more] |
ISEC2007-65 pp.133-139 |
DE |
2007-07-04 09:55 |
Miyagi |
Akiu hot springs (Sendai) |
Proposal of an E-mail transmission and reception range management method in RMX Satoshi Harada, Sang-Gyu Shin, Motomichi Toyama (Keio Univ) DE2007-109 |
In late years a social request of personal information protection rises.
So in a company, infomation system need mecha... [more] |
DE2007-109 pp.521-525 |
LOIS, IPSJ-CN |
2007-06-01 11:25 |
Osaka |
|
A lecture support system enabling to hand back papers electronically and protect private information Satoshi Ichimura, Ryosuke Yamashita, Ryota Nakamura, Noriyuki Kamibayashi (Tokyo Univ. of Tech.) |
Due to the large number of students, lectures in the auditorium are likely to be limited to delivering one-sided lecture... [more] |
OIS2007-5 pp.25-30 |
DE |
2006-07-12 14:05 |
Niigata |
HOTEL SENKEI |
Access Control Model for Personal Data in XML Database Takuya Fukushima, Motomichi Toyama (Keio Univ.) |
With the enforcement of personal information protection law, concern over management of personal data is growing nowaday... [more] |
DE2006-45 pp.139-144 |
PRMU, HIP |
2006-01-19 16:50 |
Osaka |
Osaka Univ. |
[Special Talk]
shimpo (Tsukuba Univ.) |
Legal issues concerned with the utilization of Camera have occurred in a various sides. For instance, "Assurance of Sec... [more] |
PRMU2005-148 HIP2005-118 pp.75-82 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:00 |
Iwate |
Iwate Prefectural University |
Identity Control Method Considering Privacy Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.) |
With the complete introduction of the law for protecting personal information in April 2005, the needs concerning protec... [more] |
ISEC2005-74 pp.219-223 |