Engineering Sciences/NOLTA-Information Security(Date:2002/07/11)

Presentation
表紙

,  

[Date]2002/7/11
[Paper #]
目次

,  

[Date]2002/7/11
[Paper #]
Implementation of security functions for "FIPA-OS" Agent Platform

Shinsaku KIYOMOTO,  Toshiaki TANAKA,  Koji NAKAO,  

[Date]2002/7/11
[Paper #]ISEC2002-13
Security policy for regular-connected personal network terminal : A Simple Method for All Personal Users

Daigo YOSHII,  Tatsuro IKEDA,  Tomoaki MORIJIRI,  Toshiaki SAISHO,  

[Date]2002/7/11
[Paper #]ISEC2002-14
Development of a Flexible Support Tool for Production of Security Policies

Masayuki Morohashi,  Tatsuya Fujiyama,  Yasuhiko Nagai,  

[Date]2002/7/11
[Paper #]ISEC2002-15
Implementation of Damage Analysis Support System against Illegal Access

Kenji Fukushi,  Haruo Takeuchi,  Hiroshi Kurauchi,  Masakatu Morii,  Shigeo Tsujii,  

[Date]2002/7/11
[Paper #]ISEC2002-16
Detection Algorithms of Unauthorized Manipulation for Web Remote Patrol Systems

Keisuke TAKEMORI,  Yutaka MIYAKE,  Koji NAKAO,  

[Date]2002/7/11
[Paper #]ISEC2002-17
Evaluation of Protocol and Policy-Based Intrusion Detection System in Real Environment

Tatsuya BABA,  Hiroaki KAMODA,  Katsutoshi KOKUBO,  Shigeyuki MATSUDA,  

[Date]2002/7/11
[Paper #]ISEC2002-18
Center Management Type Intrusion Detection System

Takeshi OTSUKA,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2002/7/11
[Paper #]ISEC2002-19
A Method to Detect Unknown Computer Virus Using Virtual Server

Takashi MIYAKE,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2002/7/11
[Paper #]ISEC2002-20
Copyright protection system for website content : The efficiency of a bounty hunting-based copyright protection system for website content

Tetsuya Matsushita,  Masakatsu Nishigaki,  Masakazu Soga,  Akio Takubo,  Itsukazu Nakamura,  

[Date]2002/7/11
[Paper #]ISEC2002-21
Proposal of Security Architecture for IP Multicast Routing Protocol

Yoshinori WATANABE,  Mariko KASAI,  Yoshitaka SAINOMOTO,  

[Date]2002/7/11
[Paper #]ISEC2002-22
Design and evaluation of countermeasure system against DDoS attacks using active network technology

Yusuke MORIKAWA,  Dai KASHIWA,  Shin-ya MATSUMOTO,  Hiroshi SHIGENO,  Ken-ichi OKADA,  Yutaka MATSUSHITA,  

[Date]2002/7/11
[Paper #]ISEC2002-23
The active SPAM Buckler : Preventing the SPAM

Takamichi SAITO,  Akio MORII,  Tadashi KOMORI,  Toshiyuki KITO,  

[Date]2002/7/11
[Paper #]ISEC2002-24
On the Architecture of the SSL System

Toshiyuki KITO,  Takamichi SAITO,  

[Date]2002/7/11
[Paper #]ISEC2002-25
Examination of the counter measure for the Web service based worm propagation

Masato Terada,  Yasuhiko Nagai,  Morihiko Kurata,  

[Date]2002/7/11
[Paper #]ISEC2002-26
Consideration of False Rejection Rate about DNA Biometrics Athentication system using DNA personal ID

Yukio ITAKURA,  Masaki HASHIYADA,  Toshio NAGASHIMA,  Shigeo TSUJII,  

[Date]2002/7/11
[Paper #]ISEC2002-27
Consideration on Security Quality

Hideyo MURAKAMI,  Hiroaki SAKAMOTO,  Norio YUKI,  

[Date]2002/7/11
[Paper #]ISEC2002-28
Runtime Data Extraction Tool for Java Virtual Machine

Tsutomu MATSUMOTO,  Kenichiro AKAI,  Goichi NAKAMURA,  Kou OUCHI,  Ichiro MURASE,  

[Date]2002/7/11
[Paper #]ISEC2002-29
About buffer_overflow detection by static analysis of C program

Goichi NAKAMURA,  Ichiro MURASE,  

[Date]2002/7/11
[Paper #]ISEC2002-30
12>> 1-20hit(26hit)