===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Koji Nakao (KDDI/NICT) Vice Chair: Masakatsu Morii (Kobe Univ.), Yuu Miyake (KDDI Labs.)
Secretary: Naoto Sone (Naruto Univ.), Shiho Moriai (Sony)
Assistant: Daisuke Inoue (NICT)
DATE:
Fri, Nov 5, 2010 10:30 - 17:15
PLACE:
Auditorium, Hiroshima City University(Hiroshima City University, 3-4-1 Ozuka-Higashi, Asa-Minami-Ku, Hiroshima, 731-3194, JAPAN)
TOPICS:
General
----------------------------------------
Fri, Nov 5 AM (10:30 - 17:15)
----------------------------------------
(1) 10:30 - 10:55
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application
Masakazu Soshi (Hiroshima City Univ.)
(2) 10:55 - 11:20
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.)
(3) 11:20 - 11:45
Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO)
----- Break ( 75 min. ) -----
(4) 13:00 - 13:25
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST)
(5) 13:25 - 13:50
A Timed-Release Proxy Re-Encryption Scheme and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST)
(6) 13:50 - 14:15
Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW)
----- Break ( 15 min. ) -----
(7) 14:30 - 14:55
Network Topology Analysys for Web Malware Risk Assesment
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba)
(8) 14:55 - 15:20
A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.)
(9) 15:20 - 15:45
Development of Multifactor Authentication Platform with a Single Sign-On Function
Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications)
----- Break ( 15 min. ) -----
(10) 16:00 - 16:25
Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT)
(11) 16:25 - 16:50
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
(12) 16:50 - 17:15
A Method of Sandbox Analysis of Malware Acting with Use of Online Services
Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
=== Technical Committee on Information and Communication System Security (ICSS) ===
# SECRETARY:
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-mail: is-qst
# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
Last modified: 2010-10-10 22:37:21
|
Notification: Mail addresses are partially hidden against SPAM.
|