| 2007 |
| 16 | EE | Hisashi Mohri,
Ikuya Yasuda,
Yoshiaki Takata,
Hiroyuki Seki:
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks.
AINA Workshops (2) 2007: 479-485 |
| 15 | EE | Isao Yagi,
Yoshiaki Takata,
Hiroyuki Seki:
A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power.
IEICE Transactions 90-D(5): 799-807 (2007) |
| 2006 |
| 14 | EE | Jing Wang,
Yoshiaki Takata,
Hiroyuki Seki:
HBAC: A Model for History-Based Access Control and Its Model Checking.
ESORICS 2006: 263-278 |
| 13 | EE | Jun Noda,
Mie Takahashi,
Itaru Hosomi,
Hisashi Mouri,
Yoshiaki Takata,
Hiroyuki Seki:
Integrating presence inference into trust management for ubiquitous systems.
SACMAT 2006: 59-68 |
| 2005 |
| 12 | EE | Isao Yagi,
Yoshiaki Takata,
Hiroyuki Seki:
A Static Analysis Using Tree Automata for XML Access Control.
ATVA 2005: 234-247 |
| 11 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Naoya Nitta,
Hiroyuki Seki:
Policy Controlled System and Its Model Checking.
IEICE Transactions 88-D(7): 1685-1696 (2005) |
| 2004 |
| 10 | EE | Yoshiaki Takata,
Takeshi Nakamura,
Hiroyuki Seki:
Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool.
HICSS 2004 |
| 2003 |
| 9 | EE | Susumu Kiyamura,
Yoshiaki Takata,
Hiroyuki Seki:
Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition.
PPAM 2003: 298-305 |
| 2002 |
| 8 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Daigo Taguchi,
Masayuki Nakae,
Hiroyuki Seki:
A Specification Language for Distributed Policy Control.
ICICS 2002: 386-398 |
| 7 | | Reishi Yokomori,
Fumiaki Ohata,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
An information-leak analysis system based on program slicing.
Information & Software Technology 44(15): 903-910 (2002) |
| 2001 |
| 6 | EE | Naoya Nitta,
Yoshiaki Takata,
Hiroyuki Seki:
An efficient security verification method for programs with stack inspection.
ACM Conference on Computer and Communications Security 2001: 68-77 |
| 5 | EE | Reishi Yokomori,
Fumiaki Ohata,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
Analysis and Implementation Method of Program to Detect Inappropriate Information Leak.
APAQS 2001: 5-12 |
| 4 | EE | Shigeta Kuninobu,
Yoshiaki Takata,
Hiroyuki Seki,
Katsuro Inoue:
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
ICICS 2001: 292-303 |
| 3 | | Mizuho Ikeda,
Yoshiaki Takata,
Hiroyuki Seki:
Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design.
ISAS-SCI (1) 2001: 422-428 |
| 2 | EE | Naoya Nitta,
Hiroyuki Seki,
Yoshiaki Takata:
Security verification of programs with stack inspection.
SACMAT 2001: 31-40 |
| 2000 |
| 1 | EE | Yoshiaki Takata,
Kokoro Nakagawa,
Hiroyuki Seki:
Flexible Category Structure for Supporting WWW Retrieval.
ER (Workshops) 2000: 165-177 |