IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan An Approach to Authorization Protocol Using PUF-based Access Token
Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41
OAuth is one of the protocols that enable to authorize resource access for a client through API. The authorization by OA... [more] ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41
pp.176-181
IN, NS
(Joint)
2023-03-03
12:00
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Proposal of Applying Blockchain Technology to IoT Data Distribution Method
Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] IN2022-110
pp.265-270
IN, IA
(Joint)
2021-12-16
17:05
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control
Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] IA2021-39
pp.44-49
SITE, IA, IPSJ-IOT [detail] 2021-03-02
13:30
Online Online User-Centric Capability Based Authorization and Access Control in Home Network
Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2020-52 IA2020-48
Multifunctional devices such as smart speakers are now connected to our home network. However, there is no way for users... [more] SITE2020-52 IA2020-48
pp.85-92
IN, NS
(Joint)
2019-03-05
11:10
Okinawa Okinawa Convention Center Virtual File: Wide Area Data Exchange Format Apart from Access Control and File Retrieval
Ryo Ogitani, Kunitake Kaneko (Keio Univ.) IN2018-127
The data exchange is important to promote the utilization of digital data. “Data exchange” means the state that users ca... [more] IN2018-127
pp.259-264
CQ, ICM, NS, NV
(Joint)
2018-11-16
13:45
Ishikawa   [Encouragement Talk] Unit-separete Network Access Control based on Hierarchical Network Architecture
Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] NS2018-148
pp.105-110
NS 2018-05-17
10:00
Kanagawa Yokohama City Education Center Hierarchical Role-based Network Access Control using Software-Defined Networking
Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] NS2018-15
pp.1-6
IN, IA
(Joint)
2015-12-18
13:20
Hiroshima Hiroshima City University Using a Multi-domain Authentication and Authorization Infrastructure Yamata-no-Orochi in a Distributed Storage System Content Espresso
Kei Mikami, Daisuke Ando, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IN2015-88
Currently, every internet service has its own authentication and authorization mechanism, and ev- ery service domain man... [more] IN2015-88
pp.101-106
ICSS 2015-11-27
14:15
Fukushima AIST, Fukushima Renewable Energy Institute Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language
Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more]
ICSS2015-44
pp.55-60
ICSS 2010-11-05
14:55
Hiroshima Hiroshima City University A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] ICSS2010-51
pp.41-46
ITE-BCT, ITE-CE, MoNA, CQ [detail] 2010-09-10
13:50
Fukuoka NHK Fukuoka Station Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers
Ruidong Li, Masugi Inoue (NICT) MoMuC2010-36
NerveNet is a prospective future platform to provide services to local residents, where managed mesh network provides fu... [more] MoMuC2010-36
pp.77-82
IA, ICSS 2010-06-18
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Scalable and User-friendly Access Control Mechanism for Distirubted File System
Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi IA2010-9 ICSS2010-9
This paper describes our access control mechanism for distributed file
system. Capability-based access control mechanis... [more]
IA2010-9 ICSS2010-9
pp.49-54
ISEC, LOIS 2007-11-21
16:15
Hyogo Kobe University Business Process based Access Control Method for Java EE Environment
Tomoya Okaue, Satoshi Ono (Kogakuin Univ.) ISEC2007-95 OIS2007-67
Owing to promoting the web service of Enterprise information system and requirements of compliance, web service for the ... [more] ISEC2007-95 OIS2007-67
pp.43-50
NS, CS, IN
(Joint)
2007-09-21
14:20
Miyagi Tohoku University Access Control in Cooperative Environments utilizing Social Systems -- ACCESS --
George Serban Radescu, Satoshi Ogawa, Wenpeng Wei, Gen Kitagata (Tohoku Univ.), Atsushi Takeda (Tohoku Bunka Gakuen Univ.), Norio Shiratori (Tohoku Univ.) IN2007-68
This paper introduces the notion of utility maximization based access control and creation of trusted communities throug... [more] IN2007-68
pp.143-148
ISEC, SITE, IPSJ-CSEC 2007-07-20
17:00
Hokkaido Future University-Hakodate Capability-Based System for Distributed Environment
Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC)
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] ISEC2007-73
pp.185-192
DE, DC 2005-10-17
16:00
Tokyo NTT Musashino R&D center A Logic-based Approach to Data-Dependent Access Control in RDBMSs
Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori (Gunma Univ.), Cherri M. Pancake (Oregon State Univ.)
We present a data-dependent access control approach to RDBMSs. The approach is based on a logical language that enables ... [more] DE2005-132 DC2005-26
pp.43-48
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan