| 2009 |
23 | | Yasuharu Katsuno,
Yuji Watanabe,
Michiharu Kudo,
Eiji Okamoto:
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions.
ARES 2009: 1-8 |
| 2008 |
22 | | Yasuhito Arimoto,
Michiharu Kudo,
Yuji Watanabe,
Kokichi Futatsugi:
Checking assignments of controls to risks for internal control.
ICEGOV 2008: 98-104 |
21 | | Vaibhav Gowadia,
Csilla Farkas,
Michiharu Kudo:
Checking Security Policy Compliance
CoRR abs/0809.5266: (2008) |
20 | | Seiji Munetoh,
Megumi Nakamura,
Sachiko Yoshihama,
Michiharu Kudo:
Integrity Management Infrastructure for Trusted Computing.
IEICE Transactions 91-D(5): 1242-1251 (2008) |
| 2007 |
19 | | Sachiko Yoshihama,
Takeo Yoshizawa,
Yuji Watanabe,
Michiharu Kudo,
Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications.
ESORICS 2007: 267-282 |
18 | | Takuya Mishina,
Sachiko Yoshihama,
Michiharu Kudo:
Fine-Grained Sticky Provenance Architecture for Office Documents.
IWSEC 2007: 336-351 |
17 | | Yasuharu Katsuno,
Yuji Watanabe,
Sanehiro Furuichi,
Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions.
SACMAT 2007: 225-234 |
16 | | Michiharu Kudo,
Naizhen Qi:
Access Control Policy Models for XML.
Secure Data Management in Decentralized Systems 2007: 97-126 |
15 | | Michiharu Kudo,
Yoshio Araki,
Hiroshi Nomiyama,
Shin Saito,
Yukihiko Sohda:
Best practices and tools for personal information compliance management.
IBM Systems Journal 46(2): 235-254 (2007) |
| 2006 |
14 | | Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo,
Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
ESORICS 2006: 65-80 |
13 | | Yasuharu Katsuno,
Yuji Watanabe,
Sachiko Yoshihama,
Takuya Mishina,
Michiharu Kudo:
Layering negotiations for flexible attestation.
STC 2006: 17-20 |
12 | | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Trans. Inf. Syst. Secur. 9(3): 292-324 (2006) |
| 2005 |
11 | | Naizhen Qi,
Michiharu Kudo,
Jussi Myllymaki,
Hamid Pirahesh:
A function-based access control model for XML databases.
CIKM 2005: 115-122 |
10 | | Naizhen Qi,
Michiharu Kudo:
XML Access Control with Policy Matching Tree.
ESORICS 2005: 3-23 |
| 2004 |
9 | | Naizhen Qi,
Michiharu Kudo:
Access-Condition-Table-Driven Access Control for XML Databases.
ESORICS 2004: 17-32 |
| 2003 |
8 | | Sushil Jajodia,
Michiharu Kudo:
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003
ACM 2003 |
7 | | Makoto Murata,
Akihiko Tozawa,
Michiharu Kudo,
Satoshi Hada:
XML access control using static analysis.
ACM Conference on Computer and Communications Security 2003: 73-84 |
6 | | Manabu Ando,
Kanta Matsuura,
Michiharu Kudo,
Akira Baba:
An Architecture of a Secure Database for Networked Collaborative Activities.
ICEIS (1) 2003: 3-10 |
| 2002 |
5 | | Michiharu Kudo:
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002
ACM 2002 |
4 | | Michiharu Kudo:
PBAC: Provision-based access control model.
Int. J. Inf. Sec. 1(2): 116-130 (2002) |
| 2000 |
3 | | Michiharu Kudo,
Satoshi Hada:
XML document security based on provisional authorization.
ACM Conference on Computer and Communications Security 2000: 87-96 |
| 1999 |
2 | | Michiharu Kudo,
Anish Mathuria:
An Extended Logic for Analyzing Timed-Release Public-Key Protocols.
ICICS 1999: 183-198 |
| 1998 |
1 | | Michiharu Kudo:
Electronic Submission Protocol Based on Temporal Accountability.
ACSAC 1998: 353-364 |