Shoichi Morimoto

According to our database1, Shoichi Morimoto authored at least 17 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Electronic Internal Marketing for Tourism - A New Tourism Marketing Approach.
Proceedings of the ICE-B 2014, 2014

2010
A Case Study of the e-Money Application in Japanese Public Transportation.
Proceedings of the ICE-B 2010 - Proceedings of the International Conference on e-Business, Athens, Greece, July 26, 2010

2009
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Application of COBIT to Security Management in Information Systems Development.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Classification, Formalization and Verification of Security Functional Requirements.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

A Survey of Formal Verification for Business Process Modeling.
Proceedings of the Computational Science, 2008

A Study of Value of Business Process Models from a Managerial Viewpoint.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

ISEDS: An Information Security Engineering Database System Based on ISO Standards.
Proceedings of the The Third International Conference on Availability, 2008

2007
Formal verification of security specifications with common criteria.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A Security Specification Library with a Schemaless Database.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A System Behavior Analysis Technique with Visualization of a Customer's Domain.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
A security specification verification technique based on the international standard ISO/IEC 15408.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A Security Requirement Management Database Based on ISO/IEC 15408.
Proceedings of the Computational Science and Its Applications, 2006

A Web User Interface of the Security Requirement Management Database Based on ISO/IEC 15408.
Proceedings of the Computational Science, 2006

2005
Security in Persistently Reactive Systems.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Patterning Protection Profiles by UML for Security Specifications.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005


  Loading...