Yoshiaki Takata

Orcid: 0000-0003-4982-0264

According to our database1, Yoshiaki Takata authored at least 36 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies.
IEICE Trans. Inf. Syst., 2024

2023
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Register Automata.
IEICE Trans. Inf. Syst., March, 2023

Pumping Lemmas for Languages Expressed by Computational Models with Registers.
IEICE Trans. Inf. Syst., March, 2023

A Game-Theoretic Approach to Indistinguishability of Winning Objectives as User Privacy.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2023, 2023

2022
Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking.
IEICE Trans. Inf. Syst., September, 2022

Complexity results on register context-free grammars and related formalisms.
Theor. Comput. Sci., 2022

Active Learning for Deterministic Bottom-Up Nominal Tree Automata.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022

2021
Optimal run problem for weighted register automata.
Theor. Comput. Sci., 2021

LTL Model Checking for Register Pushdown Systems.
IEICE Trans. Inf. Syst., 2021

Forward Regularity Preservation Property of Register Pushdown Systems.
IEICE Trans. Inf. Syst., 2021

Reactive Synthesis from Visibly Register Pushdown Automata.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021

2020
Generalized Register Context-Free Grammars.
IEICE Trans. Inf. Syst., 2020

2019
Complexity Results on Register Pushdown Automata.
CoRR, 2019

2018
Complexity Results on Register Context-Free Grammars and Register Tree Automata.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2018, 2018

2014
A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System.
IEICE Trans. Inf. Syst., 2014

2013
An HBAC-based approximation for IBAC programs.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2010
Automatic Generation of History-Based Access Control from Information Flow Specification.
Proceedings of the Automated Technology for Verification and Analysis, 2010

2009
Comparison of the Expressive Power of Language-Based Access Control Models.
IEICE Trans. Inf. Syst., 2009

Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation.
IEICE Trans. Inf. Syst., 2009

2007
A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power.
IEICE Trans. Inf. Syst., 2007

Certificate Chain Discovery in Web of Trust for Ad Hoc Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Integrating presence inference into trust management for ubiquitous systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

HBAC: A Model for History-Based Access Control and Its Model Checking.
Proceedings of the Computer Security, 2006

2005
Policy Controlled System and Its Model Checking.
IEICE Trans. Inf. Syst., 2005

A Static Analysis Using Tree Automata for XML Access Control.
Proceedings of the Automated Technology for Verification and Analysis, 2005

2004
Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition.
Proceedings of the Parallel Processing and Applied Mathematics, 2003

Automatic Accessibility Guideline Validation of XML Documents Based on a Specification Language.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003

2002
An information-leak analysis system based on program slicing.
Inf. Softw. Technol., 2002

A Specification Language for Distributed Policy Control.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Security verification of programs with stack inspection.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
Proceedings of the Information and Communications Security, Third International Conference, 2001

An efficient security verification method for programs with stack inspection.
Proceedings of the CCS 2001, 2001

Analysis and Implementation Method of Program to Detect Inappropriate Information Leak.
Proceedings of the 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 2001

2000
Flexible Category Structure for Supporting WWW Retrieval.
Proceedings of the Conceptual Modeling for E-Business and the Web, 2000


  Loading...