dblp.uni-trier.dewww.uni-trier.de

Yoshiaki Takata

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
16EEHisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki: Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. AINA Workshops (2) 2007: 479-485
15EEIsao Yagi, Yoshiaki Takata, Hiroyuki Seki: A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power. IEICE Transactions 90-D(5): 799-807 (2007)
2006
14EEJing Wang, Yoshiaki Takata, Hiroyuki Seki: HBAC: A Model for History-Based Access Control and Its Model Checking. ESORICS 2006: 263-278
13EEJun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki: Integrating presence inference into trust management for ubiquitous systems. SACMAT 2006: 59-68
2005
12EEIsao Yagi, Yoshiaki Takata, Hiroyuki Seki: A Static Analysis Using Tree Automata for XML Access Control. ATVA 2005: 234-247
11EEShigeta Kuninobu, Yoshiaki Takata, Naoya Nitta, Hiroyuki Seki: Policy Controlled System and Its Model Checking. IEICE Transactions 88-D(7): 1685-1696 (2005)
2004
10EEYoshiaki Takata, Takeshi Nakamura, Hiroyuki Seki: Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool. HICSS 2004
2003
9EESusumu Kiyamura, Yoshiaki Takata, Hiroyuki Seki: Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition. PPAM 2003: 298-305
2002
8EEShigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki: A Specification Language for Distributed Policy Control. ICICS 2002: 386-398
7 Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue: An information-leak analysis system based on program slicing. Information & Software Technology 44(15): 903-910 (2002)
2001
6EENaoya Nitta, Yoshiaki Takata, Hiroyuki Seki: An efficient security verification method for programs with stack inspection. ACM Conference on Computer and Communications Security 2001: 68-77
5EEReishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue: Analysis and Implementation Method of Program to Detect Inappropriate Information Leak. APAQS 2001: 5-12
4EEShigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue: An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. ICICS 2001: 292-303
3 Mizuho Ikeda, Yoshiaki Takata, Hiroyuki Seki: Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design. ISAS-SCI (1) 2001: 422-428
2EENaoya Nitta, Hiroyuki Seki, Yoshiaki Takata: Security verification of programs with stack inspection. SACMAT 2001: 31-40
2000
1EEYoshiaki Takata, Kokoro Nakagawa, Hiroyuki Seki: Flexible Category Structure for Supporting WWW Retrieval. ER (Workshops) 2000: 165-177

Coauthor Index

1Itaru Hosomi [13]
2Mizuho Ikeda [3]
3Katsuro Inoue [4] [5] [7]
4Susumu Kiyamura [9]
5Shigeta Kuninobu [4] [8] [11]
6Hisashi Mouri (Hisashi Mohri) [13] [16]
7Masayuki Nakae [8]
8Kokoro Nakagawa [1]
9Takeshi Nakamura [10]
10Naoya Nitta [2] [6] [11]
11Jun Noda [13]
12Fumiaki Ohata [5] [7]
13Hiroyuki Seki [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]
14Daigo Taguchi [8]
15Mie Takahashi [13]
16Jing Wang [14]
17Isao Yagi [12] [15]
18Ikuya Yasuda [16]
19Reishi Yokomori [5] [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)