Sachiko Yoshihama

According to our database1, Sachiko Yoshihama authored at least 20 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Guest Editorial: Special Issue on Recent Advances on Blockchain for Network and Service Management.
IEEE Trans. Netw. Serv. Manag., December, 2022

2021
HOPE-Graph: A Hypothesis Evaluation Service considering News and Causality Knowledge.
Proceedings of the IEEE International Conference on Smart Data Services, 2021

2019
Automatic smart contract generation using controlled natural language and template.
IBM J. Res. Dev., 2019

2018
Study on Integrity and Privacy Requirements of Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2015
Roadmap for Multiagent Social Simulation on HPC.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

2013
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Security for Mashups.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Web-Based Data Leakage Prevention.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Information-Flow-Based Access Control for Web Browsers.
IEICE Trans. Inf. Syst., 2009

Adaptive Security Dialogs for Improved Security Behavior of Users.
Proceedings of the Human-Computer Interaction, 2009

2008
Integrity Management Infrastructure for Trusted Computing.
IEICE Trans. Inf. Syst., 2008

SMash: secure component model for cross-domain mashups on unmodified browsers.
Proceedings of the 17th International Conference on World Wide Web, 2008

2007
ws-Attestation: Enabling Trusted Computing on Web Services.
Proceedings of the Test and Analysis of Web Services, 2007

Fine-Grained Sticky Provenance Architecture for Office Documents.
Proceedings of the Advances in Information and Computer Security, 2007

Dynamic Information Flow Control Architecture for Web Applications.
Proceedings of the Computer Security, 2007

2006
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006

Layering negotiations for flexible attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2003
Managing Behavior of Intelligent Environments.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

MyTeam: Availability Awareness Through the Use of Sensor Data.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003


  Loading...