dblp.uni-trier.dewww.uni-trier.de

Kenji Kono

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
25EEToshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono: Simplifying security policy descriptions for internet servers in secure operating systems. SAC 2009: 326-333
24EETakahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato: BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130
2008
23EEYoshihisa Abe, Hiroshi Yamada, Kenji Kono: Enforcing appropriate process execution for exploiting idle resources from outside operating systems. EuroSys 2008: 27-40
22EEA. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono: FlexBox: Sandboxing internet servers based on layer-7 contexts. ISCC 2008: 386-391
21EEMakoto Shimamura, Miyuki Hanaoka, Kenji Kono: Filtering False Positives Based on Server-Side Behaviors. IEICE Transactions 91-D(2): 264-276 (2008)
20EEAkiyoshi Sugiki, Kenji Kono, Hideya Iwasaki: Tuning mechanisms for two major parameters of Apache web servers. Softw., Pract. Exper. 38(12): 1215-1240 (2008)
2007
19EEYuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama: Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. ACSAC 2007: 107-117
18EEMasato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono: Finding candidate spots for replica servers based on demand fluctuation. ICPADS 2007: 1-10
17EEMiyuki Hanaoka, Kenji Kono, Makoto Shimamura, Satoshi Yamaguchi: An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. ISCC 2007: 79-86
16EEHiroshi Yamada, Kenji Kono: FoxyTechnique: tricking operating system policies with a virtual machine monitor. VEE 2007: 55-64
15EEMiyuki Hanaoka, Makoto Shimamura, Kenji Kono: TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems. IEICE Transactions 90-D(12): 2019-2032 (2007)
2006
14EEMakoto Shimamura, Kenji Kono: Using Attack Information to Reduce False Positives in Network IDS. ISCC 2006: 386-393
13EEHiroshi Yamada, Kenji Kono: User-level disk-bandwidth control for resource-borrowing network applications. NOMS 2006
12EEMasakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda: Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation. Systems and Computers in Japan 37(8): 24-37 (2006)
2005
11EEAkiyoshi Sugiki, Kenji Kono, Hideya Iwasaki: A Practical Approach to Automatic Parameter-Tuning of Web Servers. ASIAN 2005: 146-159
10EEMasakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda: Exploiting mobile code for user-transparent distribution of application-level protocols. Systems and Computers in Japan 36(1): 44-57 (2005)
2004
9 Takahiro Shinagawa, Kenji Kono: Implementing a secure setuid program. Parallel and Distributed Computing and Networks 2004: 301-309
2003
8EEMasakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda: Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation. ASIAN 2003: 18-32
7 Wataru Kaneko, Kenji Kono, Kentaro Shimizu: Preemptive Resource Management: Defending against Resource Monopolizing DoS. Applied Informatics 2003: 662-669
2002
6EETakahiro Shinagawa, Kenji Kono, Takashi Masuda: Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. ISSS 2002: 172-184
2001
5EETakeshi Morimoto, Kenji Kono, Ikuo Takeuchi: YabAI: The First Rescue Simulation League Champion. RoboCup 2001: 49-59
2000
4EEKenji Kono, Takashi Masuda: Efficient RMI: Dynamic Specialization of Object Serialization. ICDCS 2000: 308-315
1999
3EEMasahiko Takahashi, Kenji Kono, Takashi Masuda: Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. ICDCS 1999: 64-73
1996
2EEKenji Kono, Kazuhiko Kato, Takashi Masuda: An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. ECOOP 1996: 295-315
1994
1 Kenji Kono, Kazuhiko Kato, Takashi Masuda: Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. ICDCS 1994: 142-151

Coauthor Index

1Yoshihisa Abe [23]
2Masakuni Agetsuma [8] [10] [12]
3Masato Asahara [18]
4Shigeru Chiba [24]
5Hideki Eiraku [24]
6Miyuki Hanaoka [15] [17] [19] [21] [22] [25]
7Shoichi Hasegawa [24]
8Manabu Hirano [24]
9Miho Hishiyama [19]
10Takashi Horie [24]
11Hideya Iwasaki [8] [10] [11] [12] [20]
12Wataru Kaneko [7]
13Kazuhiko Kato [1] [2] [24]
14Eiji Kawai [24]
15Yuji Kosuga [19]
16Kenichi Kourai [24]
17Takashi Masuda [1] [2] [3] [4] [6] [8] [10] [12]
18Takeshi Morimoto [5]
19Kazumasa Omote [24]
20Yoshihiro Oyama [24]
21Akio Shimada [18]
22Makoto Shimamura [14] [15] [17] [21] [22] [25]
23Kentaro Shimizu [7]
24Takahiro Shinagawa [6] [9] [24]
25Yasushi Shinjo [24]
26Akiyoshi Sugiki [11] [20]
27Yu Takahama [19]
28Masahiko Takahashi [3]
29Ikuo Takeuchi [5]
30Kouichi Tanimoto [24]
31A. Tanoue [22]
32Hiroshi Yamada [13] [16] [18] [23]
33Satoshi Yamaguchi [17]
34Toshihiro Yokoyama [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)