|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-ARC [detail] |
2020-10-12 11:30 |
Online |
Online |
Taint tracking system in container-based virtualization environment Ayato Tachibana, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2020-18 DC2020-18 |
Decentralized Information Flow Control (DIFC) is an access control system which protect information without system opera... [more] |
CPSY2020-18 DC2020-18 pp.7-11 |
NS, IN (Joint) |
2015-03-03 11:30 |
Okinawa |
Okinawa Convention Center |
An Evaluation for A Flexible Selection of Internet Connections based on Network Expert Knowledge Masashi Ito, Asato Edo, Satoru Izumi, Toru Abe, Takuo Suganuma (Tohoku Univ.) IN2014-152 |
We have proposed an advanced method to select the Internet connections based on the network expert knowledge, by using t... [more] |
IN2014-152 pp.185-190 |
EMM |
2012-10-04 15:30 |
Chiba |
Makuhari Messe |
[Special Talk]
A Proposal on Crisis-proof Social and Life Space
-- Life-log Data Driven Information Flow and Privacy Preserving -- Noboru Sonehara (NII) EMM2012-60 |
Advent of the Internet and the Web have led to the convergence of an integrated society combining the real world and cyb... [more] |
EMM2012-60 pp.27-32 |
CS, NS, IN (Joint) |
2011-09-02 16:35 |
Miyagi |
Tohoku University |
Named Information Network Ruidong Li, Hiroaki Harai (NICT) NS2011-81 |
To satisfy the societal needs on fast and trustworthy information retrieval with low communication overhead, we identify... [more] |
NS2011-81 pp.127-132 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Lattice Model of the General Confidentiality Policies Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.) |
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] |
ISEC2008-41 pp.45-52 |
R |
2007-06-22 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Quantitative analysis for incidents of information leakage Tetsushi Yuge, Shigeru Yanagi (NDA) R2007-16 |
It is necessary to analyze information security incidents using objective criteria in order to prevent an information ou... [more] |
R2007-16 pp.13-18 |
NS, CS, IN |
2004-09-02 15:00 |
Miyagi |
Tohoku University |
Tree-Based Flow Tracing for Locating Network Pathologies Kazuhide Koide (Tohoku Univ.), Glenn Mansfield Keeni, Takeo Saito (CySols), Gen Kitagata, Norio Shiratori (Tohoku Univ.) |
If measurement points are in a leaf site, cause of the limitation of the
network information, it is difficult to catch ... [more] |
NS2004-88 IN2004-47 CS2004-43 pp.17-22 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|