Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 14:40 |
Hokkaido |
|
Analyzing Goal Dependencies among Actors using their Domain Model Haruhiko Kaiya (Kanagawa Univ.) SS2016-4 KBSE2016-10 |
Information systems are introduced into social activities performed by human and organizations.
Such activities and sy... [more] |
SS2016-4 KBSE2016-10 pp.43-48 |
KBSE |
2015-09-25 11:15 |
Osaka |
Bldg.A No.110, IST, Suita campus, Osaka University |
Towards Separation of Concerns in Screen Transition Modeling
-- Case of Business and Usability Features -- Shinpei Ogata, Shohei Kamimori (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Kozo Okano (Shinshu Univ.) KBSE2015-33 |
For requirements analysis in business Web application development employing model driven development approaches, an appr... [more] |
KBSE2015-33 pp.33-38 |
KBSE, SS, IPSJ-SE [detail] |
2015-07-23 10:40 |
Hokkaido |
|
Proposal of EMSsec-Common Problem for Security and Privacy Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15 |
[more] |
SS2015-22 KBSE2015-15 pp.69-74 |
KBSE |
2015-03-05 15:25 |
Tokyo |
The University of Electro-Communications |
A Case-based Management System for Secure Software Development Using Software Security Knowledge Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57 |
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] |
KBSE2014-57 pp.31-36 |
KBSE |
2015-01-27 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Case base of secure web application development using software security knowledge base Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47 |
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] |
KBSE2014-47 pp.49-54 |
KBSE |
2014-03-06 13:40 |
Okinawa |
Okinawaken-Seinenkaikan |
Mining of IR method for Traceability Link Recovery Ryouhei Yuasa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) KBSE2013-83 |
[more] |
KBSE2013-83 pp.25-30 |
KBSE |
2014-03-07 12:35 |
Okinawa |
Okinawaken-Seinenkaikan |
An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-93 |
We have proposed a static analysis method of android application to highlight the user information disclosed by the appl... [more] |
KBSE2013-93 pp.85-90 |
KBSE |
2014-01-28 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Recovering Traceability for using information retrieved methods Yuhto Tomii, Kenji Kaijiri, Haruhiko Kaiya, Shinpei Ogata (Shinshu Univ.) KBSE2013-75 |
[more] |
KBSE2013-75 pp.59-63 |
KBSE |
2014-01-28 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
The proposal of the technique of selecting the optimal Error-prone module prediction Hideaki Uchimiya, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-77 |
Although various techniques are proposed by Error prone module prediction, there is no technique of becoming the optimal... [more] |
KBSE2013-77 pp.71-76 |
KBSE |
2013-05-30 16:15 |
Kanagawa |
Keio University |
Proposal of method mining for the Traceability link recovery Takeyuki Ueda, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-5 |
We propose a new method for finding appropriate methods from a variety of methods of the traceability link recovery, and... [more] |
KBSE2013-5 pp.25-30 |
KBSE |
2013-05-30 17:00 |
Kanagawa |
Keio University |
A Screen Transition Model for Evaluating Usability Focusing on Function for Saving Inputs Hiroki Hayakawa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-6 |
Usability is important to attract consumers of e-commerce site, etc. A user often re-inputs data by mistakes or by chang... [more] |
KBSE2013-6 pp.31-36 |
KBSE |
2013-03-14 14:10 |
Tokyo |
Shibaura Institute of Technology |
Supporting tool for security requirements analysis using asset flows and deployment diagrams Yusuke Takizawa, Junya Sakai, Haruhiko Kaiya, Shinpei Ogata, Kenji Kaijiri (Sinshu Univ.) KBSE2012-74 |
[more] |
KBSE2012-74 pp.31-36 |
KBSE |
2012-11-22 16:05 |
Ishikawa |
Kanazawa University |
Security Requirements Analysis under Bring Your Own Device Yuuji Suzuki, Haruhiko Kaiya, Shinpei Ogata (SU), Takao Okubo, Nobuyuki Kanaya (Fujitsu Lab.), Nobukazu Yoshioka (NII) KBSE2012-47 |
[more] |
KBSE2012-47 pp.55-60 |
KBSE, SS |
2012-07-27 14:00 |
Hokkaido |
Future University Hakodate |
Evaluation of Error Prone Prediction method by using majority rule Toshihide Takahashi, Tatusya Ohnishi, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Uni.) SS2012-14 KBSE2012-16 |
[more] |
SS2012-14 KBSE2012-16 pp.25-30 |
SS |
2012-03-13 16:20 |
Okinawa |
Tenbusu-Naha |
A proposal of web complexity metrics for Ajax and it's trial tool Yuki Kagaya, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) SS2011-71 |
[more] |
SS2011-71 pp.85-90 |
SS |
2012-03-14 10:15 |
Okinawa |
Tenbusu-Naha |
Traceability reconstruction for Software Project
-- Application to Real Project -- Manabu Miyashita, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Uni.) SS2011-78 |
In the course of the development of software and the system, the quality of the document is very important. I come to be... [more] |
SS2011-78 pp.127-132 |
KBSE |
2012-01-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58 |
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] |
KBSE2011-58 pp.31-36 |
KBSE |
2012-01-23 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Supporting Evolution of i* SD model using Change Metrics and Reusable Sab-models Shunsuke Morita, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-59 |
[more] |
KBSE2011-59 pp.37-42 |
KBSE |
2011-11-10 10:20 |
Nagano |
Shinshu Univ. |
Spectrum analysis for quality requirements on a software design document Mahiro Umemura, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-37 |
[more] |
KBSE2011-37 pp.7-12 |