Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation

    Distributed DoS (Denial-of-Service) attacks, or say DDoS attacks, have reportedly caused the most serious losses in recent years and such attacks are getting worse. How to efficiently detect DDoS attacks has n...

    Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai in Security, Privacy, and Anonymity in Comput… (2017)

  2. No Access

    Chapter and Conference Paper

    Grou** Provenance Information to Improve Efficiency of Access Control

    Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Prove...

    Amril Syalim, Yoshiaki Hori, Kouichi Sakurai in Advances in Information Security and Assur… (2009)

  3. No Access

    Chapter and Conference Paper

    Reconsidering Data Logging in Light of Digital Forensics

    Logs record the events that have happened within in a system so they are considered the history of system activities. They are one of the objects that digital forensic investigators would like to examine when ...

    Bin-Hui Chou, Kenichi Takahashi in Advances in Information Security and Its A… (2009)

  4. No Access

    Chapter and Conference Paper

    Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks

    Nowadays, with over 70% of attacks carried out over the web application level, organizations need all the help they can get in making their system secure. Web Application Firewalls (WAFs) are among the tools t...

    Yi Han, Akihiro Sakai, Yoshiaki Hori in Advances in Information Security and Its A… (2009)

  5. No Access

    Chapter and Conference Paper

    Formal Verification for Access Control in Web Information Sharing System

    When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there...

    Akihiro Sakai, Yoshiaki Hori in Advances in Information Security and Assur… (2009)