default search action
Shigeaki Tanimoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c76]Hiroki Koyama, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, Atsushi Kanai:
Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness. BCD 2024: 239-246 - 2023
- [j9]Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter. IEEE Consumer Electron. Mag. 12(5): 68-75 (2023) - [j8]Shigeaki Tanimoto:
Foreword. IEICE Trans. Inf. Syst. 106(9): 1435 (2023) - [c75]Shigeaki Tanimoto, Ryusei Nakajima, Hideki Goromaru, Takashi Hatashima, Atsushi Kanai:
Risk Countermeasures Based on Five Whys Analysis Considering Offensive Security. GCCE 2023: 640-642 - [c74]Toru Kobayashi, Haruka Hata, Kazuki Fukae, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
Digital Twin Configuration Method for Public Services by Citizens. ICCE 2023: 1-3 - [c73]Shigeaki Tanimoto, Tatsuya Sugio, Hiroyuki Sato, Atsushi Kanai:
Security Policy Matching Model between Mobile IoT and Public Fog Computing. IIAI-AAI 2023: 639-644 - [c72]Shigeaki Tanimoto, Yusuke Okuwaki, Kazuhiko Kato, Tsutomu Kounosu, Hironori Takuma, Masao Toyama:
Method for Promoting the Introduction of DevSecOps to Improve Security Quality. NBiS 2023: 361-370 - [c71]Shigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai:
Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model. SERA 2023: 440-445 - 2022
- [c70]Shigeaki Tanimoto, Yudai Watanabe, Hiroyuki Sato, Atsushi Kanai:
Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation. AINA (3) 2022: 324-333 - [c69]Shinjisangeru Sugasawa, Yuko Shibahashi, Hisayoshi Kunimune, Hideki Goromaru, Shigeaki Tanimoto:
DNS-tunneling-detection Method by Monitoring DNS Subdomain Length for General Usage. GCCE 2022: 121-122 - [c68]Tomo Yuki, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
Multilayer Defense Security Management in Consideration of TPO Conditions. GCCE 2022: 123-124 - [c67]Ryuya Mishina, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects. GCCE 2022: 270-271 - [c66]Teruo Endo, Nao Ohmori, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai:
Risk Assessment Quantification for Remote Learning Based on Lecture Type. IIAI-AAI 2022: 561-567 - [c65]Hiroki Koyama, Yuuna Nakagawa, Shigeaki Tanimoto, Teruo Endo, Takashi Hatashima, Atsushi Kanai:
A Study of Risk Assessment Quantification for Secure Telework. IIAI-AAI 2022: 574-580 - [c64]Shigeaki Tanimoto, Takumi Suzuki, Takashi Hatashima, Atsushi Kanai:
Common Factor Analysis of Information Security Incidents Based on Psychological Factors. NBiS 2022: 248-257 - 2021
- [j7]Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai:
Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires. Int. J. Netw. Comput. 11(2): 412-425 (2021) - [c63]Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
IoT Reliability Improvement Method for Secure Supply Chain Management. GCCE 2021: 364-365 - [c62]Hiroki Koyama, Yuuna Nakagawa, Shigeaki Tanimoto, Teruo Endo, Takashi Hatashima, Atsushi Kanai:
Risk Assessment of Telework for the New Normal Era. GCCE 2021: 496-497 - [c61]Ryuya Mishina, Shigeaki Tanimoto, Hideki Goromaru, Hiroyuki Sato, Atsushi Kanai:
A Visualization Model for Silent Cyber Risks Contained in Emerging Risks. GCCE 2021: 498-499 - [c60]Yangchen Palmo, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP. ICCE-Berlin 2021: 1-6 - 2020
- [j6]Motoi Iwashita, Shigeaki Tanimoto, Kana Tsuchiya:
Highly Secure Transaction Mechanism for Video Affiliate Services. Rev. Socionetwork Strateg. 14(1): 77-91 (2020) - [c59]Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai:
Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale. CANDAR (Workshops) 2020: 362-367 - [c58]Yusuke Taguchi, Atsushi Kanai, Shigeaki Tanimoto:
A Distributed Log Management Method using a Blockchain Scheme. ICCE 2020: 1-3 - [c57]Sonam Wangyal, Tenzin Dechen, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT). IIAI-AAI 2020: 639-644 - [c56]Tenzin Dechen, Sonam Wangyal, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Risk Management of Mobile Workers based on Multiple Viewpoints. IIAI-AAI 2020: 645-650 - [c55]Shigeaki Tanimoto, Yuzuka Sato, Prajak Chertchom, Hiroyuki Sato, Atsushi Kanai:
Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept. NBiS 2020: 290-302 - [c54]Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
Risk Breakdown Structure and Security Space for Security Management. SOSE 2020: 7-16 - [c53]Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai, Teiichiro Miyazaki, Akira Tsujino:
Service-Oriented Software Design Model for Communication Robot. SOSE 2020: 31-39
2010 – 2019
- 2019
- [c52]Shigeaki Tanimoto, Satomu Toriyama, Motoi Iwashita, Teruo Endo, Prajak Chertchom:
Secure Operation of Biometric Authentication Based on User's Viewpoint. BCD 2019: 166-171 - [c51]Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai:
Communication Robot for Elderly Based on Robotic Process Automation. COMPSAC (2) 2019: 251-256 - [c50]Shigeaki Tanimoto, Kohei Chiba, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint. GCCE 2019: 240-242 - [c49]Shogo Maeda, Atsushi Kanai, Shigeaki Tanimoto, Takashi Hatashima, Kazuhiko Ohkubo:
A Botnet Detection Method on SDN using Deep Learning. ICCE 2019: 1-6 - [c48]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems. IIAI-AAI 2019: 884-889 - [c47]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs. IIAI-AAI 2019: 890-895 - [c46]Shigeaki Tanimoto, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, Atsushi Kanai:
Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines. NBiS 2019: 413-422 - 2018
- [c45]Takashi Hatashima, Keita Nagai, Asami Kishi, Hikaru Uekusa, Shigeaki Tanimoto, Atsushi Kanai, Hitoshi Fuji, Kazuhiko Ohkubo:
Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime. COMPSAC (2) 2018: 707-712 - [c44]Shoichi Yoneda, Takahiro Yuasa, Shigeaki Tanimoto:
Risk Assessment for Embedded Medical Information Devices. GCCE 2018: 845-846 - [c43]Keiya Matsuo, Atsushi Kanai, Takashi Hatashima, Shigeaki Tanimoto:
Dynamic Authentication Method Dependent on Surrounding Environment. GCCE 2018: 855-857 - [c42]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Proposal of Secure Business Architecture by Visible Light Communication System. IIAI-AAI 2018: 817-822 - [c41]Motoi Iwashita, Shigeaki Tanimoto, Kana Tsuchiya:
Framework of highly secure transaction management for affiliate services of video advertising. KES 2018: 1802-1809 - [c40]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Secure Visible Light Communication Business Architecture Based on Federation of ID Management. NBiS 2018: 578-589 - [c39]Hiroyuki Sato, Shigeaki Tanimoto, Toru Kobayashi, Atsushi Kanai:
Adaptive Policy Evaluation Framework for Flexible Service Provision. SOSE 2018: 124-131 - 2017
- [j5]Toru Kobayashi, Kenichi Arai, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai:
An Application Framework for Smart Education System Based on Mobile and Cloud Systems. IEICE Trans. Inf. Syst. 100-D(10): 2399-2410 (2017) - [c38]Shigeaki Tanimoto, Keita Nagai, Kenichiro Hata, Takashi Hatashima, Yasuhisa Sakamoto, Atsushi Kanai:
A Concept Proposal on Modeling of Security Fatigue Level. ACIT/CSII/BCD 2017: 29-34 - [c37]Yuya Kato, Atsushi Kanai, Shigeaki Tanimoto, Takashi Hatashima:
Dynamic security level analysis method using attack tree. GCCE 2017: 1-3 - [c36]Shigeaki Tanimoto, Shun Totsuka, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era. NBiS 2017: 737-749 - [c35]Yamato Miura, Naoki Wakabayashi, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud. NBiS 2017: 888-900 - [c34]Yusuke Makino, Kazuhiko Kato, Shigeaki Tanimoto:
The unpredictable structure of risk chains using association rule mining. SNPD 2017: 507-511 - 2016
- [j4]Motoi Iwashita, Shigeaki Tanimoto:
Service and Billing Management Method for ICT Services. Int. J. Softw. Innov. 4(2): 1-16 (2016) - [c33]Shigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification of social-media utilization in enterprise. ICIS 2016: 1-6 - [c32]Yuta Isono, Yu Ichifuji, Hiroyuki Sato, Shigeaki Tanimoto, Atsushi Kanai, Toru Kobayashi, Noboru Sonehara:
Automatic LOD conversion system of tweet data associated with tourist spots. GCCE 2016: 1-2 - [c31]Motoi Iwashita, Shigeaki Tanimoto:
Highly secure transaction system for affiliate marketing. GCCE 2016: 1-3 - [c30]Shunsuke Kan, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato, Toru Kobayashi:
Temporary grouping method using smartphones. GCCE 2016: 1-2 - [c29]Shigeaki Tanimoto, Susumu Yamada, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk assessment of BYOD: Bring your own device. GCCE 2016: 1-4 - [c28]Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
Performance evaluation on data management approach for multiple clouds using secret sharing scheme. ICCE 2016: 471-473 - [c27]Shigeaki Tanimoto, Rei Kinno, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service. IIAI-AAI 2016: 1126-1131 - [c26]Shigeaki Tanimoto, Shunsuke Shiraki, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network. NBiS 2016: 280-285 - [c25]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto, Toru Kobayashi:
Establishing Trust in the Emerging Era of IoT. SOSE 2016: 398-406 - 2015
- [c24]Shigeaki Tanimoto, Takayuki Kakuta, Hiroyuki Sato, Atsushi Kanai:
A Study of Cost Structure Visualization for Digital Forensics Deployment. ACIT-CSI 2015: 428-431 - [c23]Motoi Iwashita, Shigeaki Tanimoto:
Consideration of Highly Secure Transaction System in E-Commerce. ACIT-CSI 2015: 432-437 - [c22]Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
Secure protocol with variable security level using secret sharing scheme. GCCE 2015: 626-627 - [c21]Shoichi Yoneda, Shigeaki Tanimoto, Michio Shimomura, Hiroyuki Sato, Atsushi Kanai:
Cost reduction effect on running costs in ISMS based on sensors. GCCE 2015: 630-631 - [c20]Yuuki Kajiura, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality. ISADS 2015: 205-210 - [c19]Shoichi Yoneda, Shigeaki Tanimoto, Tsutomu Konosu, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment in Cyber-Physical System in Office Environment. NBiS 2015: 412-417 - [c18]Motoi Iwashita, Shigeaki Tanimoto:
Service and billing management method of interactive communication services. SNPD 2015: 549-554 - [c17]Shigeaki Tanimoto, Toshihiko Moriya, Hiroyuki Sato, Atsushi Kanai:
Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment. SNPD 2015: 571-575 - [c16]Shigeaki Tanimoto, Kenichi Ohata, Shoichi Yoneda, Motoi Iwashita, Hiroyuki Sato, Yoshiaki Seki, Atsushi Kanai:
Risk assessment of social-media utilization in an enterprise. SNPD 2015: 577-580 - [c15]Motoi Iwashita, Shigeaki Tanimoto:
A method for service and billing management using connection paths. SNPD 2015: 632-638 - 2014
- [c14]Shigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment Quantification in Cloud Computing. NBiS 2014: 426-431 - [c13]Atsushi Kanai, Naoya Kikuchi, Shigeaki Tanimoto, Hiroyuki Sato:
Data Management Approach for Multiple Clouds Using Secret Sharing Scheme. NBiS 2014: 432-437 - [c12]Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification in life log service. SNPD 2014: 1-6 - 2013
- [c11]Shigeaki Tanimoto, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Yoshimasa Kimura, Yohsuke Kinouchi:
A study of requirement definition in user-oriented virtual network architecture. ICIS 2013: 4-9 - [c10]Motoi Iwashita, Shigeaki Tanimoto, Yuga Fujinoki:
Approaches to analyze requirements of billing management for cloud computing services. ICIS 2013: 17-22 - [c9]Yuuki Kajiura, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato:
A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud. COMPSAC Workshops 2013: 212-217 - [c8]Shigeaki Tanimoto, Yorihiro Sakurada, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai:
A Study of Data Management in Hybrid Cloud Configuration. SNPD 2013: 381-386 - [c7]Motoi Iwashita, Shigeaki Tanimoto:
Consideration of Billing Management Method for Cloud Computing Services. SNPD 2013: 394-399 - 2012
- [j3]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. Inf. Media Technol. 7(3): 1274-1282 (2012) - [j2]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. J. Inf. Process. 20(3): 640-648 (2012) - [c6]Shigeaki Tanimoto, Shinichi Mizuhara, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance. COMPSAC Workshops 2012: 100-105 - [c5]Shigeaki Tanimoto, Daisuke Sakurai, Yosiaki Seki, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk Management to User Perception of Insecurity in Ambient Service. SNPD 2012: 771-776 - 2011
- [c4]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:
Building a Security Aware Cloud by Extending Internal Control to Cloud. ISADS 2011: 323-326 - [c3]Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI. SAINT 2011: 315-320 - 2010
- [c2]Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:
A Cloud Trust Model in a Security Aware Cloud. SAINT 2010: 121-124
2000 – 2009
- 2005
- [j1]Shigeaki Tanimoto, Naoto Fujiki:
A Proposal of Various IP Mobility Services to Apply the Mobile VLAN in the Ubiquitous Environment. IEICE Trans. Commun. 88-B(7): 2743-2755 (2005)
1990 – 1999
- 1997
- [c1]Hiroyuki Fujii, Shigeaki Tanimoto, Takeo Hariu, Hirohisa Miyashiro, Linda Galasso:
An Experimental Study of Logical Office service over International ATM Networks. LCN 1997: 530-537
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint