Sachiko Yoshihama

According to our database1, Sachiko Yoshihama authored at least 18 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Automatic smart contract generation using controlled natural language and template.
IBM Journal of Research and Development, 2019

2018
Study on Integrity and Privacy Requirements of Distributed Ledger Technologies.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2015
Roadmap for Multiagent Social Simulation on HPC.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

2013
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Security for Mashups.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Web-Based Data Leakage Prevention.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Information-Flow-Based Access Control for Web Browsers.
IEICE Transactions, 2009

Adaptive Security Dialogs for Improved Security Behavior of Users.
Proceedings of the Human-Computer Interaction, 2009

2008
Integrity Management Infrastructure for Trusted Computing.
IEICE Transactions, 2008

SMash: secure component model for cross-domain mashups on unmodified browsers.
Proceedings of the 17th International Conference on World Wide Web, 2008

2007
ws-Attestation: Enabling Trusted Computing on Web Services.
Proceedings of the Test and Analysis of Web Services, 2007

Fine-Grained Sticky Provenance Architecture for Office Documents.
Proceedings of the Advances in Information and Computer Security, 2007

Dynamic Information Flow Control Architecture for Web Applications.
Proceedings of the Computer Security, 2007

2006
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006

Layering negotiations for flexible attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2003
Managing Behavior of Intelligent Environments.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

MyTeam: Availability Awareness Through the Use of Sensor Data.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003


  Loading...