Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
An Identity Management System using Group Signatures with Message-Dependent Opening Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 |
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] |
IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 pp.267-272 |
NS, IN (Joint) |
2020-03-06 15:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Optimal Scheduling of Identity Verification Process on Decentralized Identity Ecosystem Koki Inoue, Dai Suzuki, Toshihiko Kurita, Satoshi Imai (Fujitsu Labs.) IN2019-141 |
Several working groups are coping with an ecosystem where a user manages his/her own digital IDinformation among differe... [more] |
IN2019-141 pp.375-380 |
NS |
2019-04-19 14:15 |
Kagoshima |
Tenmonkan Vision Hall |
A Study on Identity Exchange System in Consideration of User's Privacy Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18 |
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] |
NS2019-18 pp.103-106 |
HWS |
2018-04-13 11:35 |
Fukuoka |
|
Optical 3D Nano Artifact-metrics using White Light Interferometry Naoki Yoshida (YNU), Yosuke Ueba, Shumpei Nishio, Yasuyuki Ohyagi (DNP), Morihisa Hoga (Compass21), Naoya Tate (KU), Makoto Naruse (NICT), Tsutomu Matsumoto (YNU) HWS2018-3 |
We propose an artificial-metric system which authenticates nanostructures with random irregularities by means of an inte... [more] |
HWS2018-3 pp.11-16 |
ISEC, LOIS, SITE |
2016-11-07 13:25 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Institutional Matters on the Access and Storage of One's Own Fostering Records
-- Some agenda for the records management beneficial to Care Leavers -- Akiyoshi Kabeya (Chiba Univ.) ISEC2016-51 SITE2016-41 LOIS2016-29 |
Children fostered in orphanages might hope to know their own fostering records after the social care service. But accord... [more] |
ISEC2016-51 SITE2016-41 LOIS2016-29 pp.5-8 |
LOIS, ISEC, SITE |
2015-11-06 09:00 |
Kanagawa |
Kanagawa Univ. |
Self Information Control as Identity Management
-- Practical Problems of "Identity" leading to Information Ethics -- Akiyoshi Kabeya (Chiba Univ.) ISEC2015-36 SITE2015-23 LOIS2015-30 |
We can both affect and be affected by our "identity". In the internet, people are likely to present information about th... [more] |
ISEC2015-36 SITE2015-23 LOIS2015-30 pp.1-6 |
BioX, ITE-ME, ITE-IST [detail] |
2014-06-16 16:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
[Invited Talk]
Biometrics application situation for social infrastructure and its future subject Kazuo Takaragi (AIST) BioX2014-7 |
Biometrics is mainly applied to the field of finance and administration business area in dedicated devices, while it is ... [more] |
BioX2014-7 p.37 |
IT, ISEC, WBS |
2013-03-07 16:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Road of IT security standard
-- From cryptography to cloud and M2M security -- Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74 |
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] |
IT2012-88 ISEC2012-106 WBS2012-74 p.167 |
NS, IN (Joint) |
2013-03-08 09:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Proposition on Identity Management for Business Users in Cloud Environment Takuma Iwabuchi, Atsuhiro Goto (IISEC) NS2012-259 |
With the recent growth of cloud computing market and with ID life cycle becoming more multifaceted, the importance of ID... [more] |
NS2012-259 pp.547-552 |
IA |
2011-11-28 14:30 |
Hokkaido |
Greenpia Onuma (Hakodate) |
Providing Ubiquitous Networks using Host Identity Protocol Akihiro Takahashi, Tomotaka Maeda, Yasuo Okabe (Kyoto Univ.) IA2011-36 |
In an ideal ubiquitous network, anyone is supposed to be able to get connection to the Internet as long as some connecti... [more] |
IA2011-36 pp.13-18 |
IA |
2011-10-21 14:00 |
Overseas |
Dalian University of Technology (Dalian, China) |
Current Status of Nagoya University Survivor Confirmation System and Lessons Learned from Great East Japan Earthquake Shoji Kajita, Yoshihiro Ohta, Kenji Ohira, Hisanori Tajima, Satoshi Ishiguro, Jun Tobita, Hiroki Takakura, Yoshito Itoh (Nagoya Univ.) IA2011-33 |
Nagoya University has been stepwisely developing a home-grown survivor confirmation system on top of Nagoya University P... [more] |
IA2011-33 pp.45-50 |
IA, ICSS |
2011-06-16 13:30 |
Fukuoka |
Kyushu Institute of Technology |
An Architecture of A Multifactor Authentication Platform for Hybrid Cloud Satoshi Yagi, Ryoichi Kasuga, Satoshi Imamura, Jiro Yamada, Hidetoshi Takasugi (NTT Communications) IA2011-2 ICSS2011-2 |
The multifactor authentication platform which manages user identity with the authentication information like the passwor... [more] |
IA2011-2 ICSS2011-2 pp.7-12 |
NS |
2011-01-20 16:10 |
Kagawa |
Kagawa Univ. |
An Evaluation Method of Combined Authentication Techniques Including Biometric Authentication Techniques Isoo Ueno, Satoshi Yagi, Jiro Yamada, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) NS2010-142 |
To select a suitable combination of authentication techniques, we proposed an evaluation method of combined authenticati... [more] |
NS2010-142 pp.1-6 |
ICSS |
2010-11-05 15:20 |
Hiroshima |
Hiroshima City University |
Development of Multifactor Authentication Platform with a Single Sign-On Function Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) ICSS2010-52 |
We developed a multifactor authentication platform with a single sign-on function for high security and usability. The p... [more] |
ICSS2010-52 pp.47-52 |
AI, SC |
2010-08-23 16:00 |
Tokyo |
NII |
Cloud-type Teaching and Learning Environment Using Virtual Computing Laboratory Shoji Kajita (Nagoya Univ.) AI2010-20 |
This paper describes our Academic Computing Laboratory provided as
an experimental service of Tokai Academic Cloud Ce... [more] |
AI2010-20 pp.59-64 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 11:20 |
Aomori |
Hirosaki University |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18 |
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] |
ISEC2010-12 SITE2010-8 ICSS2010-18 pp.13-19 |
IN |
2010-01-14 16:50 |
Hiroshima |
Hiroshima City University |
[Invited Talk]
Development and operation of the ID federation service for consumers and its strategy Keitaro Horikawa (NTT Comm Corp.) IN2009-117 |
ID federation service for consumers has been developed and operated.
The feature of the service, the reality of the p... [more] |
IN2009-117 pp.41-46 |
IA |
2009-01-29 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62 |
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more] |
IA2008-62 pp.83-88 |
ISEC |
2008-12-17 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Access management method for Least Privilege implementation By the identity federation cross-organizations Takahito Motojima, Satoshi Ono (kogakuin univ) ISEC2008-91 |
As for the business infomation system, service construction is performed again between the organizations which used SaaS... [more] |
ISEC2008-91 pp.11-14 |
ICM |
2008-05-08 16:00 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Management of Unified-Server in Nagoya University Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9 |
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more] |
ICM2008-9 pp.47-52 |