|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] |
ISEC2007-41 SITE2007-35 pp.177-184 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 14:40 |
Hokkaido |
Future University-Hakodate |
* Kunio Miyamoto, Hidehiko Tanaka (IISEC) ISEC2007-59 |
[more] |
ISEC2007-59 pp.97-102 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:10 |
Hokkaido |
Future University-Hakodate |
Preliminary studies of secure OS as application platform Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC) |
Today, ensuring security for information systems is very important. However, ensuring security depends on the individual... [more] |
ISEC2007-71 pp.173-178 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 17:00 |
Hokkaido |
Future University-Hakodate |
Capability-Based System for Distributed Environment Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC) |
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] |
ISEC2007-73 pp.185-192 |
IT, ISEC, WBS |
2007-03-16 10:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Proposal of P2P network architechture where data acquisition can be controlled Naoki Sasamura, Hidehiko Tanaka (iisec) |
[more] |
IT2006-98 ISEC2006-153 WBS2006-95 pp.75-80 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|