Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Approach to Authorization Protocol Using PUF-based Access Token Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41 |
OAuth is one of the protocols that enable to authorize resource access for a client through API. The authorization by OA... [more] |
ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41 pp.176-181 |
IN, NS (Joint) |
2023-03-03 12:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Proposal of Applying Blockchain Technology to IoT Data Distribution Method Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110 |
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] |
IN2022-110 pp.265-270 |
IN, IA (Joint) |
2021-12-16 17:05 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39 |
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] |
IA2021-39 pp.44-49 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:30 |
Online |
Online |
User-Centric Capability Based Authorization and Access Control in Home Network Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2020-52 IA2020-48 |
Multifunctional devices such as smart speakers are now connected to our home network. However, there is no way for users... [more] |
SITE2020-52 IA2020-48 pp.85-92 |
IN, NS (Joint) |
2019-03-05 11:10 |
Okinawa |
Okinawa Convention Center |
Virtual File: Wide Area Data Exchange Format Apart from Access Control and File Retrieval Ryo Ogitani, Kunitake Kaneko (Keio Univ.) IN2018-127 |
The data exchange is important to promote the utilization of digital data. “Data exchange” means the state that users ca... [more] |
IN2018-127 pp.259-264 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
[Encouragement Talk]
Unit-separete Network Access Control based on Hierarchical Network Architecture Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148 |
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] |
NS2018-148 pp.105-110 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
IN, IA (Joint) |
2015-12-18 13:20 |
Hiroshima |
Hiroshima City University |
Using a Multi-domain Authentication and Authorization Infrastructure Yamata-no-Orochi in a Distributed Storage System Content Espresso Kei Mikami, Daisuke Ando, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IN2015-88 |
Currently, every internet service has its own authentication and authorization mechanism, and ev- ery service domain man... [more] |
IN2015-88 pp.101-106 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
ICSS |
2010-11-05 14:55 |
Hiroshima |
Hiroshima City University |
A Document Access Control Model Based on Role and Security Policy Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51 |
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] |
ICSS2010-51 pp.41-46 |
ITE-BCT, ITE-CE, MoNA, CQ [detail] |
2010-09-10 13:50 |
Fukuoka |
NHK Fukuoka Station |
Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers Ruidong Li, Masugi Inoue (NICT) MoMuC2010-36 |
NerveNet is a prospective future platform to provide services to local residents, where managed mesh network provides fu... [more] |
MoMuC2010-36 pp.77-82 |
IA, ICSS |
2010-06-18 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Scalable and User-friendly Access Control Mechanism for Distirubted File System Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi IA2010-9 ICSS2010-9 |
This paper describes our access control mechanism for distributed file
system. Capability-based access control mechanis... [more] |
IA2010-9 ICSS2010-9 pp.49-54 |
ISEC, LOIS |
2007-11-21 16:15 |
Hyogo |
Kobe University |
Business Process based Access Control Method for Java EE Environment Tomoya Okaue, Satoshi Ono (Kogakuin Univ.) ISEC2007-95 OIS2007-67 |
Owing to promoting the web service of Enterprise information system and requirements of compliance, web service for the ... [more] |
ISEC2007-95 OIS2007-67 pp.43-50 |
NS, CS, IN (Joint) |
2007-09-21 14:20 |
Miyagi |
Tohoku University |
Access Control in Cooperative Environments utilizing Social Systems
-- ACCESS -- George Serban Radescu, Satoshi Ogawa, Wenpeng Wei, Gen Kitagata (Tohoku Univ.), Atsushi Takeda (Tohoku Bunka Gakuen Univ.), Norio Shiratori (Tohoku Univ.) IN2007-68 |
This paper introduces the notion of utility maximization based access control and creation of trusted communities throug... [more] |
IN2007-68 pp.143-148 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 17:00 |
Hokkaido |
Future University-Hakodate |
Capability-Based System for Distributed Environment Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC) |
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] |
ISEC2007-73 pp.185-192 |
DE, DC |
2005-10-17 16:00 |
Tokyo |
NTT Musashino R&D center |
A Logic-based Approach to Data-Dependent Access Control in RDBMSs Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori (Gunma Univ.), Cherri M. Pancake (Oregon State Univ.) |
We present a data-dependent access control approach to RDBMSs. The approach is based on a logical language that enables ... [more] |
DE2005-132 DC2005-26 pp.43-48 |