MAEKAWA MAMORU
Emeritus Professor etc. | Emeritus Professor |
Researcher Information
Research Activity Information
Paper
- Java Bytecode Dependence Analysis for Secure Information Flow
Gaowei Bian; Ken Nakayama; Yoshitake Kobayashi; Mamoru Maekawa
International Journal of Network Security, 4, 59-68, Jan. 2007, Peer-reviwed
Scientific journal, English - An Approach for Analyzing Bytecode Control Flow
Gaowei Bian; Ken Nakayama; Yoshitake Kobayashi; Mamoru Maekawa
International Symposium on Communications and Information Technologies 2005 (ISCIT 2005), 1060-1063, Oct. 2005, Peer-reviwed
International conference proceedings, English - An event-based Spatiotemporal Approach
Shuo Wang; Ken Nakayama; Yoshitake Kobayashi; Mamoru Maekawa
ECTI Transactions on Computer and Information Technology, 1, 15-23, May 2005
Scientific journal, English - Java Mobile Code Security by Bytecode Behavior Analysis
Gaowai Bian; Ken Nakayama; Yoshitake Kobayashi; Mamoru Maekawa
ECTI Transactions on Computer and Information Theory, 1, 1, 30-39, May 2005, Peer-reviwed
Scientific journal, English - End-user customizable scene search for TV programs
T Fuangrod; K Nakayama; Y Kobayash; M Maekawa
INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, IEEE, 1035-1038, 2005, Peer-reviwed, This paper is purposed to scene search in TV program which allowed end-user can be define the pattern. Every user has different interests in TV program. Our scheme focuses on fixed background recognition. The process of this paper divided two parts; the first part is user interaction that consist manual definition of pattern and pattern matching inside video file. The second part is definition to use automatic pattern assistance tool. Simulated with Japanese baseball game, the system can search the scene following the pattern.
International conference proceedings, English - Interactive environment for smart summarization of execution trace
TE Setiadi; K Nakayama; Y Kobayashi; M Maekawa
International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, IEEE, 920-923, 2005, Peer-reviwed, Execution trace analysis is useful for testing, debugging, and modifying program. Unfortunately, execution trace dump is too much for human inspection in general. Therefore, some means to produce smart summary of execution trace are inevitable. This paper describes tool named SmartSET (Smart Summarization of Execution Trace) for execution trace summarization and analysis to help programmer to gain more understanding about program execution. It analyzes raw execution trace from observation means such as debugger or Aspect and makes specialized database for compact representation of execution trace. It provides an interactive environment for programmer to manipulate and summarize execution trace depending on the purpose of analysis.
International conference proceedings, English - A data schema and its query for modeling dynamic geographical world
S Wang; K Nakayama; Y Kobayashi; M Maekawa
INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, IEEE, 611-614, 2005, Peer-reviwed, Researchers are paying more attention to the evolving nature phenomena with the development of spatiotemporal database modeling methods. However most of the researches have been focused on the treatment of discrete changes in spatial objects. Based on the study of versions, events and processes, which is introduced in another paper [19], we proposed a relational data schema to describe spatiotemporal phenomena. The data schema is adapted for the storage of continuous evolving information instead of discreet patterns. Its framework allows the representation of entities and processes within a GIS database and enable the expression of spatial queries related to changes in both space and time. The query called STFQL was discussed in detail to allow users to ask for changes in spatiotemporal relationships.
International conference proceedings, English - Abstract interpretation for mobile code security
D Lu; K Nakayama; Y Kobayashi; M Maekawa
International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, IEEE, 1068-1071, 2005, To resolve the security problems of Java mobile code, we adapted the technique of type-level abstract interpretation to verify the security of mobile code statically. Instead of data types, the mobile code is executed abstractly at the level of security-level in our approach. Based on maintaining a distribution map of security-levels of the data in mobile code's data containers, our approach detects data-leaking just before the mobile code tries to send sensitive data out of the host. By this way our approach could make less misjudgment that verifies secure mobile programs as malicious and be more efficient than the works in [2] and [3].
International conference proceedings, English - Verification for host confidentiality by abstract interpretation in mobile code systems
D. Lu; K. Nakayama; Y. Kobayashi; M. Maekawa
IET Conference Publications, 496, 117-ROM, 2005, Peer-reviwed, To resolve the security problems of Java mobile programs, we adapted the technique of type-level abstract interpretation usually applied to verify the bytecode correctness to check the mobile program statically whether it impairs the host confidentiality. Instead of data types, our approach abstractly executes the mobile program at the level of security-level. Based on maintaining a distribution map of security-levels of the data in the mobile program's data containers, our approach detects data-leaking caused by the mobile program just before it tries to send sensitive data out of the host. By this way our approach could make fewer misjudgments that verifies secure mobile programs as malicious ones and be more efficient than the works in R. Barbuti et al., (2002), C. Bernardeschi et al. (2002), and M. Avvenuti et al. (2003).
International conference proceedings, English - モジュール差し替え時のプログラム構造変化に対応する動的リンカ
小林良岳; 唐野雅樹; 結城理憲; 紅谷順; 姜亨明; 中山健; 前川守
コンピュータシンポジウム, Nov. 2001
Japanese - Need-based requirements change management
A Kobayashi; M Maekawa
EIGHTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, IEEE COMPUTER SOC, 171-178, 2001, Many changes of system requirements can be continuously proposed during the life cycle of system. Those continuous changes of system requirements can cause many kinds of difficult and costly errors throughout the whole life cycle of system and make most of requirements engineering methods practically useless. An effective approach to manage requirements changes is, therefore, necessary for successful system development in practice. The paper suggests NRM (Need-based Requirements Management) model and a practical approach, NRM process, constructed on the NRM model to efficiently manage such continuous changes of system requirements. The NRM model has an ability to define the system requirements in 4W (Where, Who, Why, What) aspects so that system analysts can understand the requirements accurately although general system requirements analysis methods define them in only 2W (Who, What) aspects. The NRM process, which is mainly consisted of V&V (Verification and Validation) activities, continuously watches requirement changes throughout the whole life cycle of system.
International conference proceedings, English - 複数タスクの特徴に動的適合可能なマルチポリシメモリ管理システム
唐野雅樹; 小林良岳; 結城理憲; 中山健; 前川守
Swopp2001情報処理学会研究報告, 2001-OS-88, 99-106, 2001
Japanese - 彩:コンパイル時に自動生成されるPortalをもとに動的再構成可能なオペレーティングシステム
小林良岳; 砂糖友隆; 唐野雅樹; 結城理憲; 前川守
電子情報通信学会論文誌, J84-D-I, 6, 605-616, 2001
Japanese - カーネルレベルで実現したネットワーク透過な周辺機器制御の枠組み
佐藤友隆; 中山健; 小林良岳; 前川守
情報処理学会研究報告, 2000-OS-87, 87-104, 2001
Japanese - 連続ストリーム編集のためのスクリプト言語の設計
張 瑜; 中山 健; 前川 守
『第63回全国大会予稿集』,情報処理学会, 3-241-242, 2001
Japanese - プロセス移送を前提とした入出力管理の枠組み
佐藤友隆; 中山健; 小林良岳; 前川守
第61回全国大会予稿集, 情報処理学会, Oct. 2000
Japanese - 動的再構成をサポートするためのPortal生成法とその評価
小林良岳; 前川守
システムソフトウェアとオペレーティングシステム研究報告,2000-OS-84,電子情報通信学会技術報告, CPSY2000-OS-21, 84, 107-114, May 2000
Japanese - UNIXカーネル再構築概論
前川守; 小林良岳
Software Desaign 2000年3月号,技術評論社, 16-25, Feb. 2000
Japanese - Extending fault trees with an AND-THEN gate
PG Wijayarathna; M Maekawa
11TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, IEEE COMPUTER SOC, 283-292, 2000, Fault trees have been used for software safety analysis in various safety critical systems. The PRIORITY AND gate was proposed because the conventional AND gate cannot be used to represent the sequential order of the events. This paper shows that even PRIORITY AND gate is not expressive enough to represent the relative temporal order of the events precisely. We ex tend the Fault Trees with an AND-THEN gate that is the corresponding gate of the logical connective TAND. This increases the expressive power of the fault trees. The AND-THEN gate can represent relative temporal relations precisely.
International conference proceedings, English - UML-Statechartからの内部遷移に対応したテストケース生成
稲田 誠一; ガミニ ウィジャヤラトナ; 前川 守
第60回全国大会予稿集』, 情報処理学会, 2000
Japanese - プロセス移送を前提とした入出力管理の枠組み
佐藤 友隆; 中山 健; 前川 守
『第60回全国大会予稿集』, 情報処理学会, 2000
Japanese - 移動しながら連続撮影した動画像による道案内システム
長谷部 達也; 中山 健; 前川 守
『第60回全国大会予稿集』, 情報処理学会, 2000
Japanese - ソフトウェア設計仕様書の正確さと安全性が同時に検証できるツール
黄 玉蓮; ガミニ ウィジャヤラトナ; 前川 守
第60回全国大会予稿集』, 情報処理学会, 2000
Japanese - A Tool For Automatically Creating Sequences Diagrams From Usecases
周 衛華; ガミニ ウィジャヤラトナ; 前川 守
第60回全国大会予稿集』, 情報処理学会, 2000
English - 要求定義の不確実性,多義性の管理
小林 篤; ガミニ ウィジャヤラトナ; 前川 守
『第60回全国大会予稿集』, 情報処理学会, 2000
Japanese - デュアルラベルを利用したアクセス制御モデル
双紙正和; 加藤丈治; 前川 守
情報処理学会論文誌, 40, 3, 1305-1314, Mar. 1999
Japanese - A NEW ANALYSIS OF INHERITANCE AN OMALY IN CONCURRENT OBJECT-ORIENTED PROGRAMMING LANGUAGE PROCEEDINGS
ANDREW EDWARD SANTOSA; YASURO KAWATA AND; MAMORU MAEKAWA
IECI THIRD WORKSHOP ON ELECTRO-COMMUNICATIONS AND INFORMATION IN JAPAN, Mar. 1999
English - Specifying Spatio-Temporal Requirements with GSL
K. Wang; P.G. Wijayarathna; M. Maekawa
情報処理学会第59回(平成11年後期)全国大会, 1-283-284, 1999
English - 非瞬間イベントの時間関係による状態遷移可能な図式
宮宗正樹; ガミニ ウィジャヤラトナ; 前川 守
情報処理学会 第59回(平成11年後期)全国大会, 1-285-286, 1999
Japanese - 周辺装置の制約及び定義を簡単に行なう制御システムについて
向山雅彦; P. G. ウィジャヤラトナ; 双紙 正和; 前川 守
情報処理学会 第59回(平成11年後期)全国大会, 1-241-242, 1999
Japanese - 区間長制約付き正規表現を用いた時間軸を持つデータの編集環境
北村孝明; 中山 健; 前川 守
情報処理学会 第59回(平成11年後期)全国大会, 3-169-170, 1999
Japanese - "GSE A REGUIREMENTS SPECIFICATION LANGUAGE FOR END-USER INTELLIGIBIBILRM"
P. G. WIJAYARATHNA; A. SANTOSA; K. ISOGAI; Y. KAWATA AND; M. MAEKAWA
SOFTWARE:PRACTICE AND EXPERIENCE, 28, 13, 1387-1414, Nov. 1998
English - "A SOLUTION TO INHERITANCE ANOMALY BASED ON REUSABLE BEHAVIOR DEFINTION"
ANDREW EDWARD SANTOSA; YASURO KAWATA AND; MAMORU MAEKAWA
PROCEEDINGS 10th IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 586-589, Oct. 1998
English - 要求の構造化を支援する要求抽出ツール
水林誠司; 河田恭郎; 宮宗正樹; 前川 守
情報処理学会第57回(平成10年後期)全国大会, 1-189-190, 1998
Japanese - ソフトウェア開発の分析段階における異なる複数視点の統合機構
木南 毅; 河田恭郎; 前川 守
情報処理学会第57回(平成10年後期)全国大会, 1-193-194, 1998
Japanese - 共同関係に基づく認可モデルとその制御機構暗号と情報セキュリティシンポジウム
加藤丈治; 双紙正和; 前川守
SCI98, 4.3D, 1998
Japanese - プロトタイプによるOOプログラミングとクラスによる OOプログラミングの融合
河田恭郎; Andrew E.Santosa; 前川守
『夏のプログラミング・シンポジウム 「プログラムクッキング---プログラムの計量・分析・吟味---」 報告集 1997年7月16日~18日』, 33-40, 1998
Japanese - オブジェクト指向開発のための要求抽出ツール
宮宗正樹; 水林誠司; 河田恭郎; 前川守
『第56回全国大会予稿集』,情報処理学会, 1-372-373, 1998
Japanese - 状態遷移図に基づく継承異常の解決
Andrew E.Santosa; 河田恭郎; 前川守
『第56回全国大会予稿集』,情報処理学会, 1-322-323, 1998
Japanese - 新規言語 Eunice97 における開発支援環境フレームワーク
磯谷幸太郎; 河田恭郎; 前川守
『第56回全国大会予稿集』,情報処理学会, 1-235-236, 1998
Japanese - 分散環境におけるプロクシを利用した柔軟なセキュリティ制御
双紙正和; 加藤丈治; 前川守
情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 39, 3, 810-817, 1998, We are designing and developing Saga Security System, a security architecture in distributed systems. In this paper, we discuss flexible protection provided by proxies realized in Saga Security System. Now, although the usefulness of `proxies' is well-known and various systems have so far supported them in various fashions, we argue that the essential properties of such proxies can be classified into only three distinct ones: indirection, independence, and centralization. With respect to security, the three properties of such proxies are also advantageous in that proxies can provide highly flexible protection by utilizing the properties. Among advantages in regard to security control by proxies and discussed in this paper are: control over trust relationships, network-wide encapsulation, client privacy, discretionary/mandatory access control, role-based access control, and security management. Unfortunately, traditional authorization models are not fully applicable to flexible protection offered by proxies. However, the authorization model in Saga Security system (Saga authorization model) supports the novel concept of a service path and is able to deal with protection by proxies in uniform way.
Japanese
Lectures, oral presentations, etc.
- 動的更新におけるプログラム部品間の差分を吸収するアダプテーションシステム
古久澤学; 小林良岳; 中山健; 前川守
Oral presentation, Japanese, 日本ソフトウェア科学会,プログラミングおよび応用のシステムに関するワークショップ (SPA 2005)
Mar. 2005 - タスクの再構成を支援するためのファイルシステム
結城理憲; 小林良岳; 唐野雅樹; 姜亨明; 紅谷順; 前川守
Oral presentation, Japanese, 『第64回全国大会予稿集』,情報処理学会
Mar. 2002 - 時間変化するネットワークの解析機能を持つ防災地理情報システム
松本卓大; 王廓; 石川浩司; 長谷川龍弘; 中山健; 前川守
Oral presentation, Japanese, 『第64回全国大会予稿集』,情報処理学会
Mar. 2002 - 図上操作プリミティブの組み合わせによる地理情報システムの操作
笛木規雄; 中山健; 西田簿; 小林良岳; 前川守
Oral presentation, Japanese, 『第64回全国大会予稿集』,情報処理学会
Mar. 2002 - 複数地図のシームレスな解析
石川浩司; 王廓; 松本卓大; 長谷川龍弘; 中山健; 前川守
Oral presentation, Japanese, 『第64回全国大会予稿集』,情報処理学会
Mar. 2002 - インタラクティブに要約方法を定義可能なログブラウザ
西田簿; 中山健; 笛木規雄; 小林良岳; 前川守
Oral presentation, Japanese, 『第64回全国大会予稿集』,情報処理学会
Mar. 2002