Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Atsuo Hazeyama"'
Autor:
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
Publikováno v:
Applied Sciences, Vol 12, Iss 7, p 3400 (2022)
Vulnerability and attack information must be collected to assess the severity of vulnerabilities and prioritize countermeasures against cyberattacks quickly and accurately. Common Vulnerabilities and Exposures is a dictionary that lists vulnerabiliti
Externí odkaz:
https://doaj.org/article/abd3a442060f474996bc547964d28fba
Autor:
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
Publikováno v:
Information, Vol 12, Iss 8, p 298 (2021)
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulner
Externí odkaz:
https://doaj.org/article/0c5346af1e724bf48a9d297eaa834c32
Autor:
Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi
Publikováno v:
Information, Vol 12, Iss 1, p 36 (2021)
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components ar
Externí odkaz:
https://doaj.org/article/f704620971c84213bcc3f343c9ffa927
Publikováno v:
2022 29th Asia-Pacific Software Engineering Conference (APSEC).
Autor:
Hane Kondo, Atsuo Hazeyama
Publikováno v:
2022 29th Asia-Pacific Software Engineering Conference (APSEC).
Autor:
Takao Okubo, Takehisa Kato, Yoshiaki Fukazawa, Tian Xia, Shinpei Ogata, Hideyuki Kanuka, Eduardo B. Fernandez, Atsuo Hazeyama, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka
Publikováno v:
International Journal of Systems and Software Security and Protection. 12:68-85
Security and privacy in cloud systems are critical. To address security and privacy concerns, many security patterns, privacy patterns, and non-pattern-based knowledge have been reported. However, knowing which pattern or combination of patterns to u
Autor:
Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Eduardo B. Fernandez, Takao Okubo, Shinpei Ogata
Publikováno v:
IEEE Internet of Things Journal. 7:10091-10101
Due to the widespread proliferation of today’s Internet of Things (IoT), a system designer needs the IoT system and software design patterns to assist in designing scalable and replicable solutions. Patterns are encapsulations of reusable common pr
Autor:
Atsuo Hazeyama
Publikováno v:
KES
With the spread of highly functional mobile devices, anyone can send messages in a simple manner. On the other hand, risks regarding the leakage of privacy information have increased in number. Software engineers must prevent the leakage of privacy i
Autor:
Hironori Washizaki, Haruhiko Kaiya, Atsuo Hazeyama, Nobukazu Yoshioka, Takao Okubo, Shogo Tatsui, Shinpei Ogata
Publikováno v:
KES
To examine requirements and design of a system, using graphical models such as UML is one of the effective ways because it helps developers to understand the system and activities using the system. Usually, more than two types of notations are used t