The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most companies currently carry out security countermeasures against maximum-security risks based on countermeasure cost. However, maximum security is costly and low availability. If we can evaluate and recognize risk dynamically, we can change the security level according to that risk. Therefore, it is possible to lower the security level than maximum security. As a result, availability increases...
We propose a personal authentication method against shoulder-surfing attacks for smartphone using secondary channel which is information transmitted to users only. Security level and usability of the proposed method is evaluated.
More and more companies are introducing Bring Your Own Device (BYOD), in which employees utilize their own smart phones and tablets for business. However, using private terminals for business presents risks, such as leakage of business information or an employee's personal information. This paper discusses a risk assessment of BYOD in an enterprise. Specifically, it analyzes and evaluates with the...
We proposed an automatic Linked Open Data (LOD) conversion system of tweet data associated with tourist spots. This system contributes to the cost reduction of LOD based information system for tourism in terms of data maintenance and language translation. In our system, tweet data at a tourist spots will be converted into LOD automatically based on tourist spots location information. We also developed...
Groups are divided into two types. One is a permanent group, such as class of students or a division of corporate employees. The other is a temporary group, such as passengers on a bus or an airplane. There are many approaches for permanent grouping services. However, a methodology for temporary grouping does not exist. Therefore, we focus on temporary grouping and its features. In this paper, we...
Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This...
In recent years, the Smart Grid has been attracting interest as the Internet continues to rapidly expand. The Smart Grid involves IT-ization of transmission networks by installing dedicated devices such as a home gateway (smart meter) and related software. The advantages of the Smart Grid include its efficient usage of electric power and the energy-saving effect that is passed down to the consumer...
The purpose of this study is to make social media utilization by enterprises safer, more secure, and more convenient. Enterprises use social media for marketing, but this presents a lot of risks. These risks were comprehensively extracted in our previous study, but it was only a qualitative study, so a quantitative evaluation is needed to make the risks' countermeasures more practical. Thus, in this...
IoT (Internet of Things) is changing the world. Today, we see that the Internet is reaching every bit in the world. IoT environment contains mobile devices, automotive equipments, and home appliances. Everything is sensed, actuated, and integrated into the Internet. Accordingly, the related problems are fast emerging. Considering the fact that the IoT is closely connected to human activities, and...
Cloud services are becoming more and more popular, because cloud services have advantages in cost and availability, especially public cloud become very popular for consumers. However, with the popularity of public cloud services, the concern of confidentiality is recognized as the problem even for personal individual users. Secret sharing data management approaches for multiple clouds to maintain...
The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved...
Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level,...
The ICT environment has been rapidly developed by cloud computing and has become far more convenient to use. However, negative sides also exist, such as threats of viruses and unlawful access, meaning a safe and secure ICT environment is threatened. An information security management system (ISMS) is desirable to manage safe and secure use of the ICT environment in enterprises. However, the ISMS is...
The Internet and mobile communications have become more important pieces of infrastructure. On the other hand, the security incidents about an information security have increased in proportion to the spread of the Internet and mobile communications. Thus, confidential information needs to be protected strictly from these threats. Specifically, the view of the security management that also considers...
Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated...
The purpose of this study contributes to safe improvement in consideration of security in addition to convenience by the social media utilization in the company. The company uses the marketing using social media, but a lot of risks exist. We contribute to safe improvement by performing an example investigation in this study, and doing risk assessment. In this study, in order to extract a risk event,...
The ICT environment has been rapidly developed by ubiquitization, and cloud computing and has become far more convenient to use. On the other hand, the negative side also exists, such as threats of viruses and unlawful access, in which the use of the safe and secure ICT environment is threatened. Public key infrastructure (PKI) construction is desired to achieve the safe and secure use of the ICT...
Cloud services are becoming more popular and as their price has been decreasing, the opportunity to use them has been increasing. However, it has become difficult to select optimal cloud services from many services. This paper proposes an approach to dynamically selecting optimal cloud services to store data in heterogeneous-multi-cloud environments, which we evaluated by using a secret sharing scheme...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, which are a primary channel on which there is a possibility of shoulder-surfing attacks and a secondary channel on which there is information only recognized by the user. Security and usability of the proposed method is evaluated.
It is widely recognized that clouds have advantages in initial installation cost and availability. However, with the popularity of public cloud services, the concern of confidentiality is recognized as the largest problem. We propose a secret distribution data management approach for multiple clouds to maintain confidentiality that involves a secret sharing scheme. With our proposed approach, secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.