The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michiharu Kudo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michiharu Kudo
    Electronic Submission Protocol Based on Temporal Accountability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:353-364 [Conf]
  2. Michiharu Kudo, Satoshi Hada
    XML document security based on provisional authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:87-96 [Conf]
  3. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    XML access control using static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:73-84 [Conf]
  4. Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid Pirahesh
    A function-based access control model for XML databases. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:115-122 [Conf]
  5. Naizhen Qi, Michiharu Kudo
    Access-Condition-Table-Driven Access Control for XML Databases. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:17-32 [Conf]
  6. Naizhen Qi, Michiharu Kudo
    XML Access Control with Policy Matching Tree. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:3-23 [Conf]
  7. Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:65-80 [Conf]
  8. Manabu Ando, Kanta Matsuura, Michiharu Kudo, Akira Baba
    An Architecture of a Secure Database for Networked Collaborative Activities. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:3-10 [Conf]
  9. Michiharu Kudo, Anish Mathuria
    An Extended Logic for Analyzing Timed-Release Public-Key Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:183-198 [Conf]
  10. Michiharu Kudo
    PBAC: Provision-based access control model. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:116-130 [Journal]
  11. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada
    XML access control using static analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:292-324 [Journal]
  12. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi
    Dynamic Information Flow Control Architecture for Web Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:267-282 [Conf]
  13. Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo
    Fine-Grained Sticky Provenance Architecture for Office Documents. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:336-351 [Conf]
  14. Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
    Chinese-wall process confinement for practical distributed coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:225-234 [Conf]

  15. A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. [Citation Graph (, )][DBLP]


  16. Layering negotiations for flexible attestation. [Citation Graph (, )][DBLP]


  17. Checking assignments of controls to risks for internal control. [Citation Graph (, )][DBLP]


  18. Checking Security Policy Compliance [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002