Keyword : access control


Random Access Control Scheme with Reservation Channel for Capacity Expansion of QZSS Safety Confirmation System
Suguru KAMEDA Kei OHYA Tomohide TAKAHASHI Hiroshi OGUMA Noriharu SUEMATSU 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1 ; pp. 186-194
Type of Manuscript:  Special Section PAPER (Special Section on Wideband Systems)
Category: 
Keyword: 
Quasi-Zenith Satellite System (QZSS)Global Positioning System (GPS)access controlframe slotted ALOHAflag method1-bit flagsynchronized spread spectrum code division multiple access (synchronized SS-CDMA)
 Summary | Full Text:PDF(2MB)

Novel Access Control Scheme with Collision Detection Utilizing MIMO Transmission Procedure in WLAN Systems
Takefumi HIRAGURI Kentaro NISHIMORI Yoshiaki MORINO Mamoru UGAJIN Hideaki YOSHINO 
Publication:   
Publication Date: 2018/07/01
Vol. E101-B  No. 7 ; pp. 1561-1574
Type of Manuscript:  Special Section PAPER (Special Section on Communication Quality in Wireless Networks)
Category: 
Keyword: 
MIMOaccess controlWLANcollision detectionorthogonally polarized antenna
 Summary | Full Text:PDF(2.7MB)

A Distributed Capability Access Control Scheme in Information-Centric Networking
Jung-Hwan CHA Youn-Hee HAN Sung-Gi MIN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5 ; pp. 1121-1130
Type of Manuscript:  PAPER
Category: Network
Keyword: 
Information-Centric Networking (ICN)access controlcapability-based access controlprivacy preservation
 Summary | Full Text:PDF(1.5MB)

Survey of Transmission Methods and Efficiency Using MIMO Technologies for Wireless LAN Systems
Takefumi HIRAGURI Kentaro NISHIMORI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/07/01
Vol. E98-B  No. 7 ; pp. 1250-1267
Type of Manuscript:  INVITED SURVEY PAPER
Category: 
Keyword: 
MIMOMU-MIMOtransmission efficiencyoverheadaccess controlMAC protocolCSI feedbackimplicit beamformingPHY
 Summary | Full Text:PDF(2.4MB)

Authorization Conflict Problems in Combining RIF Rules with RDF Data
Jaehoon KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 863-871
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
access controlRDFRIFauthorization conflictinference
 Summary | Full Text:PDF(1.6MB)

Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS
Jing YU Toshihiro YAMAUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 807-811
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Access Control
Keyword: 
AndroidWebViewstatic analysisaccess control
 Summary | Full Text:PDF(331.3KB)

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search
Fangming ZHAO Takashi NISHIDE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/07/01
Vol. E97-D  No. 7 ; pp. 1790-1803
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
cryptographic cloud storagemultiple usersaccess controlencrypted keyword search
 Summary | Full Text:PDF(453.5KB)

A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System
Pablo LAMILLA ALVAREZ Yoshiaki TAKATA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/05/01
Vol. E97-D  No. 5 ; pp. 1149-1159
Type of Manuscript:  Special Section PAPER (Special Section on Formal Approach)
Category: Formal Verification
Keyword: 
weighted pushdown systemsaccess controlmodel checking
 Summary | Full Text:PDF(886.3KB)

Keys Distributing Optimization of CP-ABE Based Access Control in Cryptographic Cloud Storage
Yong CHENG Jiangchun REN Zhiying WANG Songzhu MEI Jie ZHOU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12 ; pp. 3088-3091
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
keys distributionaccess controlcryptographic cloud storage
 Summary | Full Text:PDF(1.3MB)

Collaborative Access Control for Multi-Domain Cloud Computing
Souheil BEN AYED Fumio TERAOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/10/01
Vol. E95-D  No. 10 ; pp. 2401-2414
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
access controldelegationcollaborative environmentcloud computing
 Summary | Full Text:PDF(1.5MB)

Atom-Role-Based Access Control Model
Weihong CAI Richeng HUANG Xiaoli HOU Gang WEI Shui XIAO Yindong CHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/07/01
Vol. E95-D  No. 7 ; pp. 1908-1917
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
access controlRBACatom roleATRBAC
 Summary | Full Text:PDF(954.5KB)

A Dynamic Secure Access Mechanism for Wireless Sensor Networks Using Usage Control and Agent Technology
Jun WU Shigeru SHIMAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/06/01
Vol. E94-B  No. 6 ; pp. 1577-1586
Type of Manuscript:  Special Section PAPER (Special Section on New Generation Mobile and Sensor Networking and Future Networks)
Category: 
Keyword: 
wireless sensor networkssecurityusage controlaccess controlauthentication
 Summary | Full Text:PDF(1.5MB)

Secure Authentication Scheme with Improved Anonymity for Wireless Environments
JongHyup LEE Taekyoung KWON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/02/01
Vol. E94-B  No. 2 ; pp. 554-557
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
access controlidentificationauthentication
 Summary | Full Text:PDF(213.8KB)

A Key Establishment Protocol for RFID User in IPTV Environment
Yoon-Su JEONG Yong-Tae KIM Jae-Min SOHN Gil-Cheol PARK Sang-Ho LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/09/01
Vol. E93-B  No. 9 ; pp. 2407-2415
Type of Manuscript:  PAPER
Category: Terrestrial Wireless Communication/Broadcasting Technologies
Keyword: 
IPTVRFIDauthentication protocolsecurityaccess control
 Summary | Full Text:PDF(747.1KB)

Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling
Jaehoon KIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7 ; pp. 1889-1899
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
graph labelingprime numbergraph decompositionaccess controlquery processing
 Summary | Full Text:PDF(1.1MB)

Time-Bound Hierarchical Key Assignment: An Overview
Wen Tao ZHU Robert H. DENG Jianying ZHOU Feng BAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1044-1052
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
information securityaccess controltime-bound hierarchical cryptographic key management
 Summary | Full Text:PDF(248.7KB)

Consistency Checking of Safety and Availability in Access Control
Ruixuan LI Jianfeng LU Zhengding LU Xiaopu MA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 491-502
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
access controlavailabilityconsistency checkingsafetyseparation-of-duty
 Summary | Full Text:PDF(281.4KB)

Information-Flow-Based Access Control for Web Browsers
Sachiko YOSHIHAMA Takaaki TATEISHI Naoshi TABUCHI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 836-850
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication and Authorization Techniques
Keyword: 
Web securitybrowser securityaccess controlinformation-flow control
 Summary | Full Text:PDF(1.3MB)

Authenticated IGMP for Controlling Access to Multicast Distribution Tree
Chang-Seop PARK Hyun-Sun KANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/03/01
Vol. E92-B  No. 3 ; pp. 838-849
Type of Manuscript:  PAPER
Category: Network
Keyword: 
IGMPaccess controlmulticast distribution treeaccount and billingDoS attack
 Summary | Full Text:PDF(696.6KB)

RDFacl: A Secure Access Control Model Based on RDF Triple
Jaehoon KIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1 ; pp. 41-50
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
database securityaccess controlauthorization conflictRDF/OWL dataSemantic Web
 Summary | Full Text:PDF(1MB)

Access Control Management for SCADA Systems
Seng-Phil HONG Gail-Joon AHN Wenjuan XU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/10/01
Vol. E91-D  No. 10 ; pp. 2449-2457
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
access controlsecurity policysupervisory control and data acquisition (SCADA)
 Summary | Full Text:PDF(1MB)

Nonorthogonal CSK/CDMA with Received-Power Adaptive Access Control Scheme
Nobuyoshi KOMURO Hiromasa HABUCHI Toshinori TSUBOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10 ; pp. 2779-2786
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communication Theory
Keyword: 
code shift keying (CSK)access controlnonorthogonal sequence
 Summary | Full Text:PDF(402.5KB)

A Novel Elliptic Curve Dynamic Access Control System
Jyh-Horng WEN Ming-Chang WU Tzer-Shyong CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/08/01
Vol. E90-B  No. 8 ; pp. 1979-1987
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
elliptic curve cryptosysteminformation securitysecure filteraccess control
 Summary | Full Text:PDF(292.4KB)

Reactive Key Management Scheme for Access Control in Group Communications
Heeyoul KIM Younho LEE Yongsu PARK Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/04/01
Vol. E90-B  No. 4 ; pp. 982-986
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
group communicationgroup securitykey managementaccess controlreactive approach
 Summary | Full Text:PDF(205.8KB)

Encryption of Composite Multimedia Contents for Access Control
Masaaki FUJIYOSHI Shoko IMAIZUMI Hitoshi KIYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/03/01
Vol. E90-A  No. 3 ; pp. 590-596
Type of Manuscript:  Special Section PAPER (Special Section on Multimedia and Mobile Signal Processing)
Category: Image
Keyword: 
multimedia communicationaccess controlcryptographyimage codingInternet
 Summary | Full Text:PDF(807.3KB)

uT-RBAC: Ubiquitous Role-Based Access Control Model
Song-hwa CHAE Wonil KIM Dong-Kyoo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 238-239
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Access Control
Keyword: 
access controlRBACubiquitous computing
 Summary | Full Text:PDF(86.9KB)

A Coordinator for Workflow Management Systems with Information Access Control
Shih-Chien CHOU Chien-Jung WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2786-2792
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
workflowworkflow management system (WFMS)coordinationaccess controlinformation securityaccess control list
 Summary | Full Text:PDF(141.8KB)

An RBAC-Based Access Control Model for Object-Oriented Systems Offering Dynamic Aspect Features
Shih-Chien CHOU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/09/01
Vol. E88-D  No. 9 ; pp. 2143-2147
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
access controlsecurityrole-based access control (RBAC)object-oriented system
 Summary | Full Text:PDF(314.8KB)

Access Control for Security and Privacy in Ubiquitous Computing Environments
Shigeki YAMADA Eiji KAMIOKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/03/01
Vol. E88-B  No. 3 ; pp. 846-856
Type of Manuscript:  INVITED PAPER (Special Section on Ubiquitous Networks)
Category: 
Keyword: 
ubiquitous computingaccess controlsecurityprivacycontexttrust
 Summary | Full Text:PDF(1015.8KB)

Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems
Wook SHIN Jong-Youl PARK Dong-Ik LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/03/01
Vol. E88-D  No. 3 ; pp. 619-627
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
trusted operating systemsecurity kernelreference monitorsecure operating systemaccess controlRBACprocedural constraints
 Summary | Full Text:PDF(817.3KB)

Secure Access of Products in a Process Environment
Shih-Chien CHOU Chia-Wei LAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/02/01
Vol. E88-D  No. 2 ; pp. 197-203
Type of Manuscript:  PAPER
Category: Software Engineering
Keyword: 
software processprocess-centered software engineering environment (PSEE)access controlaccess control listsecurity
 Summary | Full Text:PDF(141.7KB)

Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling
Wook SHIN Jeong-Gun LEE Hong Kook KIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 327-330
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Coloured Petri Netaccess controlrolebehavior
 Summary | Full Text:PDF(307.7KB)

Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
Gwoboa HORNG Chao-Liang LIU Yao-Te HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2177-2179
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptanalysisaccess controlthreshold schemeimpersonation attack
 Summary | Full Text:PDF(68KB)

A Method to Develop Feasible Requirements for Java Mobile Code Application
Haruhiko KAIYA Kouta SASAKI Kenji KAIJIRI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/04/01
Vol. E87-D  No. 4 ; pp. 811-821
Type of Manuscript:  Special Section PAPER (Special Section on Knowledge-Based Software Engineering)
Category: Requirement Engineering
Keyword: 
goal oriented requirements analysisanti-requirementssecurity policyaccess controlJava mobile codes
 Summary | Full Text:PDF(826.9KB)

The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
Masakazu SOSHI Mamoru MAEKAWA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 190-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
access controlaccess matrix modelsafety problemcomputational complexitydecidability
 Summary | Full Text:PDF(697.9KB)

Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2 ; pp. 386-391
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
cryptographycryptanalysisaccess controluser authentication
 Summary | Full Text:PDF(204.5KB)

Hierarchical Access Control Using the Secure Filter
Kuen-Pin WU Shanq-Jang RUAN Chih-Kuang TSENG Feipei LAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/06/01
Vol. E84-D  No. 6 ; pp. 700-708
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
cryptographic key assignmentaccess controluser hierarchysecure filter
 Summary | Full Text:PDF(322KB)

An Access Control Protocol for a Heterogeneous Traffic with a Multi-Code CDMA Scheme
Abbas SANDOUK Takaya YAMAZATO Masaaki KATAYAMA Akira OGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/11/25
Vol. E83-A  No. 11 ; pp. 2085-2092
Type of Manuscript:  Special Section PAPER (Special Section on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
access controlintegrated voice and datapacket CDMAmulti-code CDMAthroughput and delay analysis
 Summary | Full Text:PDF(965.8KB)

An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/03/25
Vol. E82-A  No. 3 ; pp. 548-550
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyaccess controluser hierarchy
 Summary | Full Text:PDF(76.7KB)

Access Control Scheme for Multimedia ATM Wireless Local Area Networks
Miki YAMAMOTO Satoshi MACHIDA Hiromasa IKEDA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1998/11/25
Vol. E81-B  No. 11 ; pp. 2048-2055
Type of Manuscript:  Special Section PAPER (Special Issue on Performance and Quality of Service (QoS) of Multimedia Networks)
Category: Satellite and Wireless Networks
Keyword: 
wireless ATM LANmultimedia communications DQRUMAaccess control
 Summary | Full Text:PDF(609.4KB)

Network Access Control for DHCP Environment
Kazumasa KOBAYASHI Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1998/09/25
Vol. E81-B  No. 9 ; pp. 1718-1723
Type of Manuscript:  PAPER
Category: Communication Networks and Services
Keyword: 
mobile computing environmentDHCPaccess controlgatewayauthentication
 Summary | Full Text:PDF(546.2KB)

An Authorization Model for Object-Oriented Databases and Its Efficient Access Control
Toshiyuki MORITA Yasunori ISHIHARA Hiroyuki SEKI Minoru ITO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1998/06/25
Vol. E81-D  No. 6 ; pp. 521-531
Type of Manuscript:  PAPER
Category: Databases
Keyword: 
database management systemaccess controlauthorization modelinference rule
 Summary | Full Text:PDF(930.1KB)

Modified Cryptographic Key Assignment Scheme for a Group-Oriented User Hierarchy
Victor R.L. SHEN Tzer-Shyong CHEN Feipei LAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/10/25
Vol. E80-A  No. 10 ; pp. 2032-2034
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographic key assignmentaccess controlgroup hierarchy
 Summary | Full Text:PDF(226.9KB)

Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
Victor R.L. SHEN Tzer-Shyong CHEN Feipei LAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/10/25
Vol. E80-A  No. 10 ; pp. 2035-2037
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographic key assignmentaccess controluser hierarchy
 Summary | Full Text:PDF(166.4KB)

CDMA ALOHA Systems with Modified Channel Load Sensing Protocol for Satellite Communications
Hiraku OKADA Masato SAITO Takeshi SATO Takaya YAMAZATO Masaaki KATAYAMA Akira OGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/12/25
Vol. E79-A  No. 12 ; pp. 2035-2042
Type of Manuscript:  Special Section PAPER (Special Secton on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
CDMA ALOHAthroughputaccess controlaccess timing delay
 Summary | Full Text:PDF(707.6KB)

A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme
Shiuh-Jeng WANG Jin-Fu CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 76-85
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
access controlsecurity classgroup-orientedsecret sharing
 Summary | Full Text:PDF(794.8KB)

Hybrid Access Control for Broadcast-Based ATM-LANs
Junichi MURAYAMA Teruyuki KUBO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1995/04/25
Vol. E78-B  No. 4 ; pp. 523-530
Type of Manuscript:  Special Section PAPER (Special Issue on Traffic and Quality Control for Communication Networks)
Category: 
Keyword: 
B-ISDNATM-LANconnectionless servicemultipoint communicationaccess control
 Summary | Full Text:PDF(764.3KB)

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11 ; pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF(261.4KB)

A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp
Min-Shiang HWANG Wen-Guey TZENG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1994/09/25
Vol. E77-D  No. 9 ; pp. 1042-1046
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
access controlkey-lock-pairprime factorization theoremtime stamp
 Summary | Full Text:PDF(468.1KB)