The SCEAS System
Navigation Menu

Search the dblp DataBase


Yoshiaki Takata: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki
    Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:479-485 [Conf]
  2. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    Analysis and Implementation Method of Program to Detect Inappropriate Information Leak. [Citation Graph (0, 0)][DBLP]
    APAQS, 2001, pp:5-12 [Conf]
  3. Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
    A Static Analysis Using Tree Automata for XML Access Control. [Citation Graph (0, 0)][DBLP]
    ATVA, 2005, pp:234-247 [Conf]
  4. Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki
    An efficient security verification method for programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:68-77 [Conf]
  5. Yoshiaki Takata, Kokoro Nakagawa, Hiroyuki Seki
    Flexible Category Structure for Supporting WWW Retrieval. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2000, pp:165-177 [Conf]
  6. Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    HBAC: A Model for History-Based Access Control and Its Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:263-278 [Conf]
  7. Yoshiaki Takata, Takeshi Nakamura, Hiroyuki Seki
    Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  8. Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:292-303 [Conf]
  9. Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki
    A Specification Language for Distributed Policy Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:386-398 [Conf]
  10. Mizuho Ikeda, Yoshiaki Takata, Hiroyuki Seki
    Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:422-428 [Conf]
  11. Susumu Kiyamura, Yoshiaki Takata, Hiroyuki Seki
    Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition. [Citation Graph (0, 0)][DBLP]
    PPAM, 2003, pp:298-305 [Conf]
  12. Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata
    Security verification of programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:31-40 [Conf]
  13. Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki
    Integrating presence inference into trust management for ubiquitous systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:59-68 [Conf]
  14. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    An information-leak analysis system based on program slicing. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:15, pp:903-910 [Journal]

  15. Automatic Generation of History-Based Access Control from Information Flow Specification. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002