2007 |
16 | EE | Hisashi Mohri,
Ikuya Yasuda,
Yoshiaki Takata,
Hiroyuki Seki:
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks.
AINA Workshops (2) 2007: 479-485 |
15 | EE | Isao Yagi,
Yoshiaki Takata,
Hiroyuki Seki:
A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power.
IEICE Transactions 90-D(5): 799-807 (2007) |
2006 |
14 | EE | Jing Wang,
Yoshiaki Takata,
Hiroyuki Seki:
HBAC: A Model for History-Based Access Control and Its Model Checking.
ESORICS 2006: 263-278 |
13 | EE | Jun Noda,
Mie Takahashi,
Itaru Hosomi,
Hisashi Mouri,
Yoshiaki Takata,
Hiroyuki Seki:
Integrating presence inference into trust management for ubiquitous systems.
SACMAT 2006: 59-68 |
2005 |
12 | EE | Isao Yagi,
Yoshiaki Takata,
Hiroyuki Seki:
A Static Analysis Using Tree Automata for XML Access Control.
ATVA 2005: 234-247 |
11 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Naoya Nitta,
Hiroyuki Seki:
Policy Controlled System and Its Model Checking.
IEICE Transactions 88-D(7): 1685-1696 (2005) |
2004 |
10 | EE | Yoshiaki Takata,
Takeshi Nakamura,
Hiroyuki Seki:
Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool.
HICSS 2004 |
2003 |
9 | EE | Susumu Kiyamura,
Yoshiaki Takata,
Hiroyuki Seki:
Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition.
PPAM 2003: 298-305 |
2002 |
8 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Daigo Taguchi,
Masayuki Nakae,
Hiroyuki Seki:
A Specification Language for Distributed Policy Control.
ICICS 2002: 386-398 |
7 | | Reishi Yokomori,
Fumiaki Ohata,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
An information-leak analysis system based on program slicing.
Information & Software Technology 44(15): 903-910 (2002) |
2001 |
6 | EE | Naoya Nitta,
Yoshiaki Takata,
Hiroyuki Seki:
An efficient security verification method for programs with stack inspection.
ACM Conference on Computer and Communications Security 2001: 68-77 |
5 | EE | Reishi Yokomori,
Fumiaki Ohata,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
Analysis and Implementation Method of Program to Detect Inappropriate Information Leak.
APAQS 2001: 5-12 |
4 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
ICICS 2001: 292-303 |
3 | | Mizuho Ikeda,
Yoshiaki Takata,
Hiroyuki Seki:
Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design.
ISAS-SCI (1) 2001: 422-428 |
2 | EE | Naoya Nitta,
Hiroyuki Seki,
Yoshiaki Takata:
Security verification of programs with stack inspection.
SACMAT 2001: 31-40 |
2000 |
1 | EE | Yoshiaki Takata,
Kokoro Nakagawa,
Hiroyuki Seki:
Flexible Category Structure for Supporting WWW Retrieval.
ER (Workshops) 2000: 165-177 |