Michiharu Kudo

According to our database1, Michiharu Kudo authored at least 33 papers between 1998 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Inter-organizational Business Processes Managed by Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Risk Prediction of Diabetic Nephropathy via Interpretable Feature Extraction from EHR Using Convolutional Autoencoder.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

Time-Discounting Convolution for Event Sequences with Ambiguous Timestamps.
Proceedings of the IEEE International Conference on Data Mining, 2018

Feature Extraction from Electronic Health Records of Diabetic Nephropathy Patients with Convolutioinal Autoencoder.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Adaptable Privacy-Preserving Data Curation for Business Process Analysis Services.
Proceedings of the IEEE International Conference on Services Computing, 2016

Analyzing Business Processes by Automatically Detecting KPI Thresholds.
Proceedings of the IEEE International Conference on Services Computing, 2016

Operational Work Pattern Discovery Based on Human Behavior Analysis.
Proceedings of the 2014 Annual SRII Global Conference, 2014

Business Monitoring Framework for Process Discovery with Real-Life Logs.
Proceedings of the Business Process Management - 12th International Conference, 2014

Business Process Analysis and Real-world Application Scenarios.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Business Process Discovery by Using Process Skeletonization.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Robot-Assisted Healthcare Support for an Aging Society.
Proceedings of the 2012 Annual SRII Global Conference, San Jose, CA, USA, July 24-27, 2012, 2012

A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
Proceedings of the The Forth International Conference on Availability, 2009

Access Control Policy Languages in XML.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Integrity Management Infrastructure for Trusted Computing.
IEICE Trans. Inf. Syst., 2008

Checking Security Policy Compliance
CoRR, 2008

Checking assignments of controls to risks for internal control.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

Access Control Policy Models for XML.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Best practices and tools for personal information compliance management.
IBM Syst. J., 2007

Chinese-wall process confinement for practical distributed coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Fine-Grained Sticky Provenance Architecture for Office Documents.
Proceedings of the Advances in Information and Computer Security, 2007

Dynamic Information Flow Control Architecture for Web Applications.
Proceedings of the Computer Security, 2007

XML access control using static analysis.
ACM Trans. Inf. Syst. Secur., 2006

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006

Layering negotiations for flexible attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

XML Access Control with Policy Matching Tree.
Proceedings of the Computer Security, 2005

A function-based access control model for XML databases.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

Access-Condition-Table-Driven Access Control for XML Databases.
Proceedings of the Computer Security, 2004

An Architecture of a Secure Database for Networked Collaborative Activities.
Proceedings of the ICEIS 2003, 2003

PBAC: Provision-based access control model.
Int. J. Inf. Sec., 2002

Provisional Authorizations.
Proceedings of the E-Commerce Security and Privacy, 2001

XML document security based on provisional authorization.
Proceedings of the CCS 2000, 2000

An Extended Logic for Analyzing Timed-Release Public-Key Protocols.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Electronic Submission Protocol Based on Temporal Accountability.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998