IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
KBSE 2019-03-02
09:00
Kyoto Doshisha University Kambaikan Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study
Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] KBSE2018-62
pp.51-56
ISEC 2018-09-07
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Development of Portable Automotive Security Testbed with Adaptability: PASTA
Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] ISEC2018-51
pp.7-14
QIT
(2nd)
2018-06-04
13:20
Hiroshima ICCH Ran [Poster Presentation] Certifying Quantum Randomness by Probability Estimation
Yanbao Zhang (NTT-BRL), Emanuel Knill, Peter Bierhorst (NIST)
We introduce probability estimation, a broadly applicable framework to certify
randomness in a finite sequence of mea... [more]

KBSE 2018-03-01
15:50
Okinawa   Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] KBSE2017-50
pp.67-72
IA 2017-10-13
16:30
Tokyo Fukutake Hall, The University of Tokyo Testbed for Security Analysis of the DNS64 IPv6 Transition Technology in Virtual Environment
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-22
In this paper, we demonstrate the feasibility of building a virtual network with several virtual Linux hosts for testing... [more] IA2017-22
pp.19-24
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] ICSS2015-53
pp.35-40
KBSE 2015-01-26
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model -- A Case of an ASP.NET Application --
Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] KBSE2014-42
pp.19-24
ICSS, IPSJ-SPT 2014-03-28
14:45
Okinawa Meio Univiersity System Security Analysis using Dependency Relationship on Cloud
Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] ICSS2013-93
pp.231-236
KBSE 2014-01-28
15:00
Tokyo Kikai-Shinko-Kaikan Bldg An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria
Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] KBSE2013-78
pp.77-82
KBSE 2013-09-13
15:00
Tokyo The University of Electro-Communications A classification method in identifying security patterns for a dependable Security Case -- From Security Patterns to D-Case --
Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] KBSE2013-52
pp.91-96
KBSE, SS 2012-07-27
13:30
Hokkaido Future University Hakodate Integration Method of UML Requirement Analytical Model and Security Requirement Analysis based on Common Criteria
Atsushi Noro (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2012-13 KBSE2012-15
Analyzing security requirements for a system at an early stage of development is effective in developing a system with l... [more] SS2012-13 KBSE2012-15
pp.19-24
KBSE 2012-01-23
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications
Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] KBSE2011-58
pp.31-36
KBSE 2010-03-05
10:30
Fukuoka Kyushu Institute of Technology (kyutech plaza) Goal-Oriented Security Requirements Analysis Using Common Criteria as Domain Ontology
Motoshi Saeki, Shinpei Hayashi (Tokyo Inst. of Tech.), Haruhiko Kaiya (Shinshu Univ.) KBSE2009-65
This paper proposes the usage of security targets, which are documents compliant to Common Criteria (ISO/IEC 15408), as ... [more] KBSE2009-65
pp.37-42
IA, ICSS 2009-06-18
16:15
Tokyo Kikai-Shinko-Kaikan Bldg [Invited Talk] *
Youki Kadobayashi (Nara Inst. of Sci and Tech.) IA2009-10 ICSS2009-18
Network security technologies today are facing broad range of requirements, including network situational awareness, roo... [more] IA2009-10 ICSS2009-18
p.55
ISEC 2008-09-12
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Estimating RSA Private-Keys Generated in Security Chips
Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] ISEC2008-71
pp.55-62
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:35
Okayama Okayama Univ. Visualization Technologies of nicter Incident Analysis System
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] ISEC2006-51
pp.83-89
SS 2005-12-20
14:30
Kochi Kochi Women's University Supporting Method for Insertion of Behaviors based on Security Requirements to Scenarios
Hiroya Itoga, Atsushi Ohnishi (Ritsumeikan Univ.)
Security requirements which requested from some audit standards are difficult to understand and to check for stakeholder... [more] SS2005-71
pp.49-54
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan