Search Results - "Enokido, Tomoya"
-
1
Implementation and evaluation of the information flow control for the Internet of Things
Published in Concurrency and computation (10-10-2021)“…In the Internet of Things, the CBAC (capability‐based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a…”
Get full text
Journal Article -
2
Time‐based legality of information flow in the capability‐based access control model for the Internet of Things
Published in Concurrency and computation (10-12-2021)“…Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the…”
Get full text
Journal Article -
3
Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation
Published in Internet of things (Amsterdam. Online) (01-09-2021)“…In the CBAC (Capability-Based Access Control) model proposed for realizing the secure IoT (Internet of Things), authorizers issue subjects capability tokens,…”
Get full text
Journal Article -
4
Purpose-Based Information Flow Control for Cyber Engineering
Published in IEEE transactions on industrial electronics (1982) (01-06-2011)“…Cyber engineering is getting more significant in not only manufacturing but also business applications. Information management technologies play a key role in…”
Get full text
Journal Article -
5
The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services
Published in Internet of things (Amsterdam. Online) (01-03-2020)“…There are various kinds of Internet of Things (IoT) services like home management services. In the IoT services, a large volume of data is gathered from…”
Get full text
Journal Article -
6
Capability token selection algorithms to implement lightweight protocols
Published in Internet of things (Amsterdam. Online) (01-08-2022)“…The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to…”
Get full text
Journal Article -
7
Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…Various types of scalable and high performance computing systems are developed to realize distributed applications. In order to realize not only scalable but…”
Get full text
Conference Proceeding Journal Article -
8
Energy-efficient dynamic clusters of servers
Published in The Journal of supercomputing (01-05-2015)“…Electric power consumed by servers has to be reduced in order to realize green societies. We consider computation (CP) and storage (ST) types of application…”
Get full text
Journal Article -
9
Energy consumption laxity-based quorum selection for distributed object-based systems
Published in Evolutionary intelligence (01-03-2020)“…In object based systems, an object is an unit of computation resource. Distributed applications are composed of multiple objects. Objects in an application are…”
Get full text
Journal Article -
10
Power consumption and processing models of servers in computation and storage based applications
Published in Mathematical and computer modelling (01-09-2013)“…The electric power consumption of information systems has to be reduced in addition to increasing the performance and fault tolerance in order to realize green…”
Get full text
Journal Article -
11
Energy-Aware Clusters of Servers for Storage and Computation Applications
Published in 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) (01-03-2016)“…It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most…”
Get full text
Conference Proceeding Journal Article -
12
A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…Information systems have to be secure in presence of illegal access. A transaction illegally reads an object if the transaction reads the object which includes…”
Get full text
Conference Proceeding Journal Article -
13
The evaluation of the extended transmission power consumption (ETPC) model to perform communication type processes
Published in Computing (01-10-2013)“…In energy-aware information systems, it is critical to discuss how to select a server for each request from clients in order to not only achieve performance…”
Get full text
Journal Article -
14
-
15
Asynchronous Migration of Process Replicas in a Cluster
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…Application processes have to be efficiently and reliably performed on servers in a cluster. A process is replicated to increase the reliability and…”
Get full text
Conference Proceeding Journal Article -
16
Energy-Aware Virtual Machine Migration Models in a Scalable Cluster of Servers
Published in 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) (01-03-2017)“…In clusters of servers like cloud computing systems, computation resources like CPUs and storages are virtualized. Virtual machines are now widely used to…”
Get full text
Conference Proceeding -
17
An Eco Migration of Virtual Machines in a Server Cluster
Published in 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) (01-03-2017)“…Virtual machines are now widely used to support applications with virtual computation service in server clusters. Here, a virtual machine can migrate to a…”
Get full text
Conference Proceeding -
18
Energy-Efficient Server Clusters to Perform Communication Type Application Processes
Published in The Journal of supercomputing (01-09-2014)“…In energy-aware systems, it is critical to discuss how to reduce the total electric power consumption of information systems. In this paper, we consider…”
Get full text
Journal Article -
19
A legal information flow (LIF) scheduler based on role-based access control model
Published in Computer standards and interfaces (01-09-2009)“…Information systems have to be consistent and secure in presence of multiple conflicting transactions. The role-based access control (RBAC) model is widely…”
Get full text
Journal Article -
20
An Energy-Efficient Redundant Execution Algorithm by Terminating Meaningless Redundant Processes
Published in 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) (01-03-2013)“…It is critical to discuss how to realize not only energy-aware but also robust clusters of servers. A client usually issues a request to one server in a…”
Get full text
Conference Proceeding