A cloud trust model in a security aware cloud H Sato, A Kanai, S Tanimoto 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010 | 148 | 2010 |
A proposal of blockchain-based electronic voting system CK Adiputra, R Hjort, H Sato 2018 second world conference on smart trends in systems, security and …, 2018 | 94 | 2018 |
Risk management on the security problem in cloud computing S Tanimoto, M Hiramoto, M Iwashita, H Sato, A Kanai 2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011 | 88 | 2011 |
Establishing trust in the emerging era of IoT H Sato, A Kanai, S Tanimoto, T Kobayashi 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), 398-406, 2016 | 49 | 2016 |
Derepo: A distributed privacy-preserving data repository with decentralized access control for smart health Y Ding, H Sato 2020 7th IEEE international conference on cyber security and cloud computing …, 2020 | 32 | 2020 |
Building a security aware cloud by extending internal control to cloud S Hiroyuki, K Atsushi, T Shigeaki 2011 Tenth International Symposium on Autonomous Decentralized Systems, 323-326, 2011 | 25 | 2011 |
Bloccess: towards fine-grained access control using blockchain in a distributed untrustworthy environment Y Ding, H Sato 2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020 | 20 | 2020 |
Self-sovereign identity as a service: architecture in practice Y Ding, H Sato 2022 IEEE 46th annual computers, software, and applications conference …, 2022 | 10 | 2022 |
Bloccess: enabling fine-grained access control based on blockchain Y Ding, H Sato Journal of Network and Systems Management 31 (1), 6, 2023 | 9 | 2023 |
Static optimization of XSLT stylesheets: template instantiation optimization and lazy XML parsing M Kenji, S Hiroyuki Proceedings of the 2005 ACM symposium on Document engineering, 55-57, 2005 | 9 | 2005 |
Array form representation of idiom recognition system for numerical programs S Hiroyuki ACM SIGAPL APL Quote Quad 31 (2), 87-98, 2000 | 9 | 2000 |
Characteristics of loop unrolling effect: Software pipelining and memory latency hiding Hiroyuki, Teruhiko 2001 Innovative Architecture for Future Generation High-Performance …, 2001 | 8 | 2001 |
A Service Framework based on Grades of IdPs and SPs. S Hiroyuki Security and Management, 379-385, 2009 | 7 | 2009 |
N±ɛ: Reflecting Local Risk Assessment in LoA H Sato Lecture Notes in Computer Science 5871, 833, 2009 | 4 | 2009 |
A resource-oriented grid meta-scheduler based on agents S Kentaro, S Hiroyuki Proceedings of the 25th conference on Proceedings of the 25th IASTED …, 2007 | 4 | 2007 |
Formalism-driven development: concepts, taxonomy, and practice Y Ding, H Sato Applied Sciences 12 (7), 3415, 2022 | 3 | 2022 |
Risk assessment quantification in life log service S Tanimoto, K Takahashi, T Yabuki, K Kato, M Iwashita, H Sato, A Kanai 15th IEEE/ACIS International Conference on Software Engineering, Artificial …, 2014 | 3 | 2014 |
Leveraging self-sovereign identity in decentralized data aggregation Y Ding, H Sato, MG Machizawa 2022 Ninth International Conference on Software Defined Systems (SDS), 1-8, 2022 | 2 | 2022 |
Idiom Recognition and Program Scheme Recognition Based Program Transformations for Performance Tuning--Beyond Compiler Optimizations-- S Hiroyuki 2009 International Conference on Parallel and Distributed Computing …, 2009 | 2 | 2009 |
Flow analytic type system for array bound checks M Yutaka, S Hiroyuki Electronic Notes in Theoretical Computer Science 78, 178-195, 2003 | 2 | 2003 |