Shigeaki Tanimoto

Orcid: 0000-0002-2291-0959

According to our database1, Shigeaki Tanimoto authored at least 83 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Foreword.
IEICE Trans. Inf. Syst., September, 2023

Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter.
IEEE Consumer Electron. Mag., September, 2023

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Method for Promoting the Introduction of DevSecOps to Improve Security Quality.
Proceedings of the Advances in Networked-based Information Systems, 2023

Security Policy Matching Model between Mobile IoT and Public Fog Computing.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

Digital Twin Configuration Method for Public Services by Citizens.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Risk Countermeasures Based on Five Whys Analysis Considering Offensive Security.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2022
Common Factor Analysis of Information Security Incidents Based on Psychological Factors.
Proceedings of the Advances in Network-Based Information Systems, 2022

A Study of Risk Assessment Quantification for Secure Telework.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Risk Assessment Quantification for Remote Learning Based on Lecture Type.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Multilayer Defense Security Management in Consideration of TPO Conditions.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

DNS-tunneling-detection Method by Monitoring DNS Subdomain Length for General Usage.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires.
Int. J. Netw. Comput., 2021

Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP.
Proceedings of the 11th IEEE International Conference on Consumer Electronics, 2021

IoT Reliability Improvement Method for Secure Supply Chain Management.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

A Visualization Model for Silent Cyber Risks Contained in Emerging Risks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Risk Assessment of Telework for the New Normal Era.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Highly Secure Transaction Mechanism for Video Affiliate Services.
Rev. Socionetwork Strateg., 2020

Risk Breakdown Structure and Security Space for Security Management.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Service-Oriented Software Design Model for Communication Robot.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept.
Proceedings of the Advances in Networked-Based Information Systems, 2020

A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT).
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

Risk Management of Mobile Workers based on Multiple Viewpoints.
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

A Distributed Log Management Method using a Blockchain Scheme.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines.
Proceedings of the Advances in Networked-based Information Systems, 2019

Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

A Botnet Detection Method on SDN using Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Communication Robot for Elderly Based on Robotic Process Automation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Secure Operation of Biometric Authentication Based on User's Viewpoint.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

2018
Adaptive Policy Evaluation Framework for Flexible Service Provision.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Secure Visible Light Communication Business Architecture Based on Federation of ID Management.
Proceedings of the Advances in Network-Based Information Systems, 2018

Framework of highly secure transaction management for affiliate services of video advertising.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Proposal of Secure Business Architecture by Visible Light Communication System.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

Risk Assessment for Embedded Medical Information Devices.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Dynamic Authentication Method Dependent on Surrounding Environment.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
An Application Framework for Smart Education System Based on Mobile and Cloud Systems.
IEICE Trans. Inf. Syst., 2017

The unpredictable structure of risk chains using association rule mining.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud.
Proceedings of the Advances in Network-Based Information Systems, 2017

Dynamic security level analysis method using attack tree.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

A Concept Proposal on Modeling of Security Fatigue Level.
Proceedings of the 5th International Conference on Applied Computing and Information Technology, 2017

2016
Service and Billing Management Method for ICT Services.
Int. J. Softw. Innov., 2016

Establishing Trust in the Emerging Era of IoT.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Performance evaluation on data management approach for multiple clouds using secret sharing scheme.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Risk assessment of BYOD: Bring your own device.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Temporary grouping method using smartphones.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Highly secure transaction system for affiliate marketing.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Automatic LOD conversion system of tweet data associated with tourist spots.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Risk assessment quantification of social-media utilization in enterprise.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Risk assessment of social-media utilization in an enterprise.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A method for service and billing management using connection paths.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Service and billing management method of interactive communication services.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Risk Assessment in Cyber-Physical System in Office Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Cost reduction effect on running costs in ISMS based on sensors.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure protocol with variable security level using secret sharing scheme.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

A Study of Cost Structure Visualization for Digital Forensics Deployment.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

Consideration of Highly Secure Transaction System in E-Commerce.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

2014
Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Data Management Approach for Multiple Clouds Using Secret Sharing Scheme.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

2013
A Study of Data Management in Hybrid Cloud Configuration.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Consideration of Billing Management Method for Cloud Computing Services.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A study of requirement definition in user-oriented virtual network architecture.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

Approaches to analyze requirements of billing management for cloud computing services.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

2012
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement.
J. Inf. Process., 2012

Risk Management to User Perception of Insecurity in Ambient Service.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Quantifying Cost Structure of Campus PKI.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Building a Security Aware Cloud by Extending Internal Control to Cloud.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

2010
A Cloud Trust Model in a Security Aware Cloud.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2005
A Proposal of Various IP Mobility Services to Apply the Mobile VLAN in the Ubiquitous Environment.
IEICE Trans. Commun., 2005

1997
An Experimental Study of Logical Office service over International ATM Networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997


  Loading...