Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2014-03-08 14:50 |
Okinawa |
|
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets -- Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76 |
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] |
LOIS2013-76 pp.131-136 |
SSS |
2013-12-19 16:20 |
Tokyo |
|
[Invited Lecture]
Safety culture in Japan - Nuclear power and energy Michitsugu Mori (Hokkaido Univ.) SSS2013-33 |
Accompanied by huge tsunami, the Pacific Ocean earthquake off the coast of the Tohoku region, occurred on March 11 2011,... [more] |
SSS2013-33 pp.21-24 |
R |
2013-10-18 16:15 |
Fukuoka |
|
Black Swan Based VM Placement and Migration Optimizations in Clouds
-- Towards Reliability Profiling of Multi-VM Applications, Data Centers, and Clouds -- Marat Zhanikeev (Kyushu Inst. of Tech.) R2013-70 |
Black Swan is a term used in economics to discuss resilience of complex systems to failures. Black Swans are directly a... [more] |
R2013-70 pp.37-40 |
R |
2013-06-14 14:20 |
Tokyo |
|
Black Swan Strategies for Performance Management of Large-Scale Clouds Marat Zhanikeev (Kyushu Inst. of Tech.) R2013-18 |
Cloud services today are not sufficiently big to cause major problems with performance, resilience and availability. Th... [more] |
R2013-18 pp.13-16 |
SC |
2013-03-15 13:40 |
Tokyo |
|
Towards Provenance-Based Security Risk Assessment Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shin'ichiro Matsuo (NICT) |
We are developing a Knowledge Language Grid (KLG) system, which enables users to combine multiple assets data from diffe... [more] |
SC2012-18 pp.7-12 |
SSS |
2012-12-20 15:00 |
Kyoto |
|
Proposal of evidence based risk management strategy for machinery Shigeo Umezaki, Kyoko Hamajima, Shoken Shimizu (jniosh) SSS2012-25 |
Occupational accidents caused by machines have frequently occurred. However, the relationships between types of industri... [more] |
SSS2012-25 pp.13-16 |
KBSE, SS |
2012-07-27 16:50 |
Hokkaido |
Future University Hakodate |
A proposed research framework for "Dependability Science" based on assurance cases Vaise Patu, Yutaka Matsuno, Shuichiro Yamamoto (Nagoya Univ.) SS2012-19 KBSE2012-21 |
Achieving system dependability is still not
yet being clear identified for today’s modern software
systems. The firs... [more] |
SS2012-19 KBSE2012-21 pp.55-59 |
SSS |
2012-07-26 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal on quantitative risk evaluation method considering the cooperation of safety of machinery and functional safety Shigeo Umezaki, Shoken Shimizu, Kyoko Hamajima (jniosh) SSS2012-6 |
To prevent industrial accidents that occur in man-machine systems, it is indispensable to carry out the cooperation of p... [more] |
SSS2012-6 pp.5-8 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-18 16:40 |
Chiba |
Chiba Institute of Technology |
A Study of the Risk Management in Life Log Service Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8 |
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] |
LOIS2012-8 pp.127-132 |
KBSE |
2012-03-16 11:40 |
Aichi |
Nagoya Univ. |
Case study for identifying estimation risk in contract-base software projects Masato Notomi, Takako Nakatani (Univ. of Tsukuba) |
In a contract-base software project, the developer might prepare the estimation, before identifying all the requirements... [more] |
|
ICM |
2012-03-16 17:40 |
Okinawa |
Dan-jo Kyoudou Sankaku Center |
Proposal and Evaluation of Risk Quantification Method for Configuration Changes in Virtualized IT Systems Tatsuya Sato, Masahiro Yoshizawa, Yoshio Suzuki, Ken Naono (Hitachi) ICM2011-74 |
System engineers must review new configuration when configuration changes are applied to IT system. The amount of config... [more] |
ICM2011-74 pp.155-160 |
KBSE |
2011-11-10 13:20 |
Nagano |
Shinshu Univ. |
Towards a method for reducing estimation risk in contract-base software projects Masato Notomi, Takako Nakatani (Univ. of Tsukuba) KBSE2011-40 |
In a contract-base software project, the developer might prepare the estimation, before identifying all the requirements... [more] |
KBSE2011-40 pp.25-30 |
ICM, LOIS |
2011-01-21 13:30 |
Nagasaki |
|
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62 |
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] |
ICM2010-51 LOIS2010-62 pp.105-110 |
ISEC |
2010-12-15 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Operational Monitoring Method for Compliance Management in Bank Yusuke Tanno, Satoshi Ono (Kogakuin Univ.) ISEC2010-71 |
By Internal Control, there is a growing up accountability requirement for organization. One of the accountability is Com... [more] |
ISEC2010-71 pp.37-39 |
SSS |
2009-08-24 13:00 |
Osaka |
|
A study for suited risk-assessmennt method of labor accident for the small and medium enterprise Motoya Takagi (jniosh) SSS2009-12 |
The objective of this research is to advance risk assessment and develop practicality of such assessment in order to red... [more] |
SSS2009-12 pp.1-4 |
MI |
2009-01-19 09:40 |
Overseas |
National Taiwan University |
[Keynote Address]
Quantitative Image Analysis of Breast MRI Maryellen L. Giger (Univ. of Chicago) MI2008-55 |
The role of breast MRI in the management of the cancer patient is increasing. This lecture will provide an overview of ... [more] |
MI2008-55 p.1 |
CAS, MSS |
2008-11-07 14:05 |
Osaka |
Osaka University |
A visualization of unexpected obstacles in system by Petri Net Ichiro Toyoshima, Takeichiro Nishikawa (Toshiba) CAS2008-59 CST2008-37 |
The demand of risk management technologies has been increased by some reasons,e.g. accidents of large scale system and r... [more] |
CAS2008-59 CST2008-37 pp.83-88 |
ISEC |
2008-09-12 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69 |
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] |
ISEC2008-69 pp.39-46 |
ET |
2008-01-26 09:55 |
Ibaraki |
Tsukuba Univ. of Technology |
A Risk Management Education System for Corporation Satoshi Takahashi, Muhammad Dzulqarnain (Yamagata Univ.), Takayuki Fujimoto (Sonoda Women's Univ.), Tokuro Matsuo (Yamagata Univ.) ET2007-70 |
In resent years, many companies engender fraudulences and affairs, and affront several crisises. Such situations are def... [more] |
ET2007-70 pp.7-12 |
SITE, IPSJ-EIP |
2007-05-25 13:50 |
Tokyo |
|
A study on risk for using e-mail system bothered by spam messages and silent mails Takashi Okuda (Aichi Pref. Univ.) SITE2007-3 |
pam is an unwanted electronic mail often advertisements and commercial messages. The continuing increase in spam has res... [more] |
SITE2007-3 pp.11-16 |