|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
KBSE |
2014-01-28 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78 |
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] |
KBSE2013-78 pp.77-82 |
IN, IA (Joint) |
2011-12-16 12:50 |
Hiroshima |
Hiroshima City University |
Overlay Based, Distributed Defense-Framework against DDoS Attacks Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51 |
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] |
IA2011-51 pp.37-42 |
ICSS |
2010-11-05 14:55 |
Hiroshima |
Hiroshima City University |
A Document Access Control Model Based on Role and Security Policy Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51 |
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] |
ICSS2010-51 pp.41-46 |
KBSE |
2010-03-05 10:30 |
Fukuoka |
Kyushu Institute of Technology (kyutech plaza) |
Goal-Oriented Security Requirements Analysis Using Common Criteria as Domain Ontology Motoshi Saeki, Shinpei Hayashi (Tokyo Inst. of Tech.), Haruhiko Kaiya (Shinshu Univ.) KBSE2009-65 |
This paper proposes the usage of security targets, which are documents compliant to Common Criteria (ISO/IEC 15408), as ... [more] |
KBSE2009-65 pp.37-42 |
LOIS, IPSJ-DC |
2007-07-27 15:25 |
Hokkaido |
Future University-Hakodate |
Database Security Technologies for Internal Control Yutaka Matsunaga (TED), Michiko Oba (Hitachi) |
As the requirements for preventing information leakage and for regulation compliance are getting critical, the security ... [more] |
OIS2007-25 pp.65-70 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|