Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
HWS, ICD [detail] |
2021-10-19 15:00 |
Online |
Online |
A Survey on Security Requirements in System-on-Chip(SoC) Yasuyuki Kawanishi, Hirotaka Yoshida (AIST) HWS2021-49 ICD2021-23 |
In the EU, a cybersecurity certification scheme for IoT products based on the Common Criteria is being developed. At tha... [more] |
HWS2021-49 ICD2021-23 pp.43-48 |
COMP |
2016-03-14 13:30 |
Fukuoka |
|
Longest Common Subsequence Problem for Numerical Sequences by using Order-Isomorphic-Substrings Masatoshi Kurihara, Kazuyuki Narisawa, Ayumi Shinohara (Tohoku Univ.) COMP2015-38 |
The order-isomorphism can be used as a criteria for the similarity of numerical sequences. The order-preserving matching... [more] |
COMP2015-38 pp.11-20 |
KBSE |
2014-01-28 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78 |
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] |
KBSE2013-78 pp.77-82 |
SS |
2013-05-09 14:40 |
Kagawa |
Kagawa University (Saiwaimachi) |
Detection of Security Threats Using Patterns of Sequence Diagrams Tatsuya Abe, Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) SS2013-1 |
Detecting security threats of information system in design phase helps to develop secure systems. However, the more thre... [more] |
SS2013-1 pp.1-6 |
KBSE, SS |
2012-07-27 13:30 |
Hokkaido |
Future University Hakodate |
Integration Method of UML Requirement Analytical Model and Security Requirement Analysis based on Common Criteria Atsushi Noro (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2012-13 KBSE2012-15 |
Analyzing security requirements for a system at an early stage of development is effective in developing a system with l... [more] |
SS2012-13 KBSE2012-15 pp.19-24 |
SITE |
2010-10-15 11:15 |
Tokyo |
Nihon Univ. (Surugadai) |
Improving traceability through graphical representation of security requirements Mariko Fukawa, Akira Aiba (SIT) SITE2010-37 |
ISO/IEC15408 (CC) is used as a criterion to evaluate security. However it has difficulty to identify effect of modificat... [more] |
SITE2010-37 pp.19-24 |
KBSE, SS |
2010-05-27 12:00 |
Kyoto |
Doshisha University, Imadegawa Campus |
Goal-oriented modeling method for security requirements Masue Shiba, Naokazu Sasaki (Toshiba Solutions Corp.), Kenji Taguchi (AIST), Nobukazu Yoshioka (NII) SS2010-3 KBSE2010-3 |
In the upper process of the system development, it is important to set the problem of security, and to define the securi... [more] |
SS2010-3 KBSE2010-3 pp.15-20 |
KBSE |
2010-03-05 10:30 |
Fukuoka |
Kyushu Institute of Technology (kyutech plaza) |
Goal-Oriented Security Requirements Analysis Using Common Criteria as Domain Ontology Motoshi Saeki, Shinpei Hayashi (Tokyo Inst. of Tech.), Haruhiko Kaiya (Shinshu Univ.) KBSE2009-65 |
This paper proposes the usage of security targets, which are documents compliant to Common Criteria (ISO/IEC 15408), as ... [more] |
KBSE2009-65 pp.37-42 |
CQ |
2006-07-13 13:00 |
Hokkaido |
Future University-Hakodate |
A Study on Automatic Classification of Worm Flows Based on Common Pieces of Flow Payloads Hiroshi Tsunoda, Yuji Waizumi, Zheng Sekibe, Yoshiaki Nemoto (Tohoku Univ.) CQ2006-20 |
Security management is a core issue in the current Internet, and
illegal accesses is a serious problem in security mana... [more] |
CQ2006-20 pp.17-22 |