|
Search the dblp DataBase
Kouta Sasaki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, Kenji Kaijiri
A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2006, pp:444-448 [Conf]
- Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. [Citation Graph (0, 0)][DBLP] QSIC, 2006, pp:125-132 [Conf]
- Haruhiko Kaiya, Kouta Sasaki, Yasunori Maebashi, Kenji Kaijiri
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application. [Citation Graph (0, 0)][DBLP] RE, 2003, pp:357-358 [Conf]
Search in 0.001secs, Finished in 0.001secs
|