Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 14:10 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Hardware security and trust
-- The nice relationship between digital trust and hardware security -- Yasushi Matsumoto (JNSA) HWS2024-1 |
Describes digital trusts, a system that plays an important role in trust formation in the digital society [more] |
HWS2024-1 pp.1-2 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Ehime, Online) (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University (Fukuoka) |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
IA |
2023-09-21 16:30 |
Hokkaido |
Hokkaido Univeristy (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17 |
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] |
IA2023-17 pp.38-42 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-14 15:00 |
Osaka |
Osaka University Nakanoshima Center + Online (Osaka, Online) (Primary: On-site, Secondary: Online) |
Initial implementation of CYPHONIC end-device functions on WindowsOS Guilherme Seidy Ujiie, Ren Goto, Kazushige Matama, Yoshiya Suzuki, Katsuhiro Naitou (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2023-38 |
The authors have been researching and developing CYber PHysical Overlay Network over Internet Communication (CYPHONIC), ... [more] |
SeMI2023-38 pp.76-81 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
SWIM, SC |
2022-08-26 15:45 |
Online |
Held online (Online) |
Proposal for Introduction of Resource control policies apply to Decentralized ID Ryo Tateishi, Hosono Shigeru (TUT) SWIM2022-19 SC2022-25 |
Realization of Web 3.0 architecture requires a shift from Centralized ID to Decentralized ID with Self-Sovereign, and a ... [more] |
SWIM2022-19 SC2022-25 pp.52-57 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |
ICM |
2022-07-07 14:50 |
Hokkaido |
Tokachi Plaza (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Zero Trust Architecture and Risk Management Yuki Unno (Fujitsu Research) ICM2022-14 |
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] |
ICM2022-14 pp.21-23 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Fukuoka, Online) (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online (Online) |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. (Hyogo) |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
IA |
2016-11-04 15:05 |
Overseas |
Taipei (Taiwan) (Overseas) |
An anonymous distributed electronic voting system using Zerocoin Yu Takabatake, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-54 |
Existing e-voting systems rely on a database managed by an administrator, and hence the administrator may possibly count... [more] |
IA2016-54 pp.127-131 |