Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SC |
2023-03-17 13:25 |
Tokyo |
NII (Primary: On-site, Secondary: Online) |
A Self-Sovereign Service platform with Decentralized Identity and Smart Contracts Ryo Tateishi, Tatsuto Kibe, Kousuke Kakumoto, Hosono Shigeru (TUT) SC2022-43 |
The authors propose a design method for a Self-Sovereign service platform that realizes Web 3.0 architecture. To transfo... [more] |
SC2022-43 pp.28-33 |
IN, IA (Joint) |
2021-12-16 17:05 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39 |
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] |
IA2021-39 pp.44-49 |
SC |
2021-05-28 10:30 |
Online |
Online |
Service Authentication Proxy for Accelerating API Development Rina Ueno, Nariyuki Saito, Hiroshi Nasu, Yu Nakata (Hitachi) SC2021-3 |
Since API publish involves the risk of being attacked from outside the company, it is necessary to develop an authentica... [more] |
SC2021-3 pp.13-18 |
IN, NS (Joint) |
2021-03-04 11:20 |
Online |
Online |
Resource Authorization Patterns on Edge Computing Ryu Watanabe, Ayumu Kubota (KDDIR), Jun Kurihara (UOH) IN2020-68 |
In order to realize a distribution of processing load and a prompt response, the concept of edge computing is drawing an... [more] |
IN2020-68 pp.85-90 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:55 |
Online |
Online |
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation Satsuki Nishioka, Yasuo Okabe (Kyoto Univ.) SITE2020-53 IA2020-49 |
In modern Web services, authentication federation that separates the Identity Provider (IdP), which centrally manages au... [more] |
SITE2020-53 IA2020-49 pp.93-100 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 11:45 |
Online |
Online |
A Proposal of Framework for Authentication Systems and Verification Method Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58 |
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] |
CQ2020-58 pp.62-65 |
IN, NS (Joint) |
2019-03-05 10:50 |
Okinawa |
Okinawa Convention Center |
A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126 |
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] |
IN2018-126 pp.253-258 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
[Encouragement Talk]
Unit-separete Network Access Control based on Hierarchical Network Architecture Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148 |
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] |
NS2018-148 pp.105-110 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
API Authentication/Authorization Mechanism in MEC Environments Kenichi Kashibuchi (NTT) NS2017-235 |
Edge computing attracts attention with ultra-low latency communication and geographically load balancing. In Multi-acces... [more] |
NS2017-235 pp.381-384 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
IN, IA (Joint) |
2015-12-18 13:20 |
Hiroshima |
Hiroshima City University |
Using a Multi-domain Authentication and Authorization Infrastructure Yamata-no-Orochi in a Distributed Storage System Content Espresso Kei Mikami, Daisuke Ando, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IN2015-88 |
Currently, every internet service has its own authentication and authorization mechanism, and ev- ery service domain man... [more] |
IN2015-88 pp.101-106 |
IA |
2014-09-12 11:30 |
Tokyo |
Tokyo Tech Front |
An authentication and authorization model with both personal attributes and set attributes Takeshi Nishimura, Eisaku Sakane, Kento Aida, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2014-17 |
In order to separate authentication and authorization, identity federation is rapidly spreading, especially in the acade... [more] |
IA2014-17 pp.19-24 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2014-05-23 10:50 |
Oita |
HorutoHall OITA |
A Study of API Delivery and Authentication Method for Device Functions Virtualization Yoshihisa Ito, Takeshi Matsumoto, Takuya Murayama, Yukio Koike, Hiroaki Kawata, Toru Nakanishi (NTT) ICM2014-5 |
Today, the spread of the electronics devices having a communication interface, such as information appliances and sensor... [more] |
ICM2014-5 pp.107-112 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:50 |
Ishikawa |
Hotel Rurikoh |
An Authentication Federation Proxy Which Conceals Attributes and Authorizatiion Policies Each Other Yasuo Okabe, Takaaki Komura (Kyoto Univ.), Hiroyuki Sato (Univ. of Tokyo), Kazutsuna Yamaji, Motonori Nakamura (NII) SITE2013-63 IA2013-88 |
A mechanism for authentication and authorization federation which conceals attributes of the IdP from the SP and simulta... [more] |
SITE2013-63 IA2013-88 pp.67-72 |
ITE-BCT, ITE-CE, MoNA, CQ [detail] |
2010-09-10 13:50 |
Fukuoka |
NHK Fukuoka Station |
Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers Ruidong Li, Masugi Inoue (NICT) MoMuC2010-36 |
NerveNet is a prospective future platform to provide services to local residents, where managed mesh network provides fu... [more] |
MoMuC2010-36 pp.77-82 |
IA, ICSS |
2010-06-18 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Scalable and User-friendly Access Control Mechanism for Distirubted File System Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi IA2010-9 ICSS2010-9 |
This paper describes our access control mechanism for distributed file
system. Capability-based access control mechanis... [more] |
IA2010-9 ICSS2010-9 pp.49-54 |
CQ, NS, ICM (Joint) |
2009-11-12 15:50 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
An implementation of a personal communicator with privacy management control Yuki Tomita (UEC), Osamu Mizuno (Kogakuin Univ./NTT), Kimihiko Fukami (NTT), Yoshikatsu Tada (UEC) NS2009-108 |
To exchange personal information among users, displayed information should be controlled from the point of view of human... [more] |
NS2009-108 pp.27-32 |
NS |
2008-10-23 14:20 |
Osaka |
Kansai University |
Dynamic Integration Method for Web Services Based on Grid Middleware Hisaka Okuzawa, Takumi Miyoshi (Shibaura Inst. of Tech.) NS2008-74 |
The grid computing is essentially based on Web service and can be constructed by integrating multiple Web services.
Fo... [more] |
NS2008-74 pp.37-42 |
NS, IN (Joint) |
2008-03-07 08:15 |
Okinawa |
Bankoku Shinryokan |
Social Networking Architecture
-- Network Construction, Operation, and Utilization based on Human Trust Chain -- Katsunori Yamaoka, Akira Sasaki, Kenta Yasukawa, Takamichi Miyata, Yoshinori Sakai (Tokyo Tech.) IN2007-190 |
Current service authorization systems have mostly assumed administrators are divided from ordinal users and the
all the... [more] |
IN2007-190 pp.187-192 |