Communication-Information and Communication Management(Date:2012/05/03)

Presentation
表紙

,  

[Date]2012/5/3
[Paper #]
目次

,  

[Date]2012/5/3
[Paper #]
Study of the Visual Presentation for Network Traffic Anomaly Detection

Wataru Konishi,  Akinori Takahashi,  Ryuji Igarashi,  Hiroshi Ueda,  Yukio Iwaya,  Tetsuo Kinoshita,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.1,Vol.2012-IOT17 No.1
A Security Controlling System using Wiki Software and a Portable and Remote Controllable Device

TAKASHI YAMANOUE,  KENTARO ODA,  KOICHI SHIMOZONO,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.2,Vol.2012-IOT17 No.2
TMForum Management World Asia 2012参加報告(サービス管理,運用管理技術,セキュリティ管理,及び一般)

,  

[Date]2012/5/3
[Paper #]ICM2012-1
TMF Action Week Madrid 2012報告(サービス管理,運用管理技術,セキュリティ管理,及び一般)

,  

[Date]2012/5/3
[Paper #]ICM2012-2
The requirements for the data modeling tool using TMF SID and its solution

Manabu NISHIO,  Masakatsu FUJIWARA,  

[Date]2012/5/3
[Paper #]ICM2012-3
NDSS 2012 Symposium Report

SEIICHIRO MIZOGUCHI,  KUNIYASU SUZAKI,  KATSUNARI YOSHIOKA,  KANTA MATSUURA,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.7,Vol.2012-IOT17 No.7
ESSoS(Engineering Secure Software and Systems) 12 symposium report

SHINICHI MATSUMOTO,  KOUICHI SAKURAI,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.8,Vol.2012-IOT17 No.8
The design of network switches that outsource user authentication

KOICHI SAKURAI,  AKIRA SATO,  KENICHI YOSHIDA,  YASUSHI SHINJO,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.9,Vol.2012-IOT17 No.9
Improving the efficiency in an authentication system and its compatibility for the Gakunin federation

S. TADAKI,  H. ETO,  M. OTANI,  K. WATANABE,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.10,Vol.2012-IOT17 No.10
A study of LDAP load balancing for University ICT services

EISUKE ITO,  YOSHIAKI KASAHARA,  NAOMI FUJIMURA,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.11,Vol.2012-IOT17 No.11
Technology trends of cloud computing

Hisanori Matsuzawa,  

[Date]2012/5/3
[Paper #]ICM2012-4
The cloud computing and its management technology : The development and practice of NTT cloud controller

Yusuke Kila,  

[Date]2012/5/3
[Paper #]ICM2012-5
A Study of User Interface of On-demand Overlay Network for Clouds

Taro HASHIMOTO,  Yuka KAMIZURU,  Hiroaki HATA,  

[Date]2012/5/3
[Paper #]ICM2012-6
A Proposal of the End-to-end Operational Management System for Integrated Management of the Cloud Service

Yusuke Suzuki,  Kengo Kawashima,  Kazuki Doi,  Tomohiro Sato,  Tetsuya Yamaguchi,  Masahiro Uraga,  

[Date]2012/5/3
[Paper #]ICM2012-7
The Accountability of Cloud Services and Traceability Technology.

Shinichi Nakahara,  Iifan Tyou,  

[Date]2012/5/3
[Paper #]ICM2012-8
A Study on Mobile Access Infrastructure

KATSUYUKI UMEZAWA,  TAKASHI KAWANO,  NOBUYOSHI MORITA,  HIROMI ISOKAWA,  MAKOTO KAYASHIMA,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.17,Vol.2012-IOT17 No.17
Privacy protection using masquerade pointer on Android OS

HARUNOBU AGEMATSU,  JUNYA KANI,  KOHEI NASAKA,  HIDEAKI KAWABATA,  TAKAMASA ISOHARA,  KEISUKE TAKEMORI,  MASAKATSU NISHIGAKI,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.18,Vol.2012-IOT17 No.18
A Proposal of a CAPTCHA Using a Japanese Character, a Set of Kanji and an Alphanumeric Character

KAZUKI KANAMORI,  EIICHIRO KODAMA,  JIAHONG WANG,  TOYOO TAKATA,  

[Date]2012/5/3
[Paper #]Vol.2012-CSEC-57 No.19,Vol.2012-IOT17 No.19
12>> 1-20hit(35hit)