Masaya Sato, Toshihiro Yamauchi,
"Secure log transfer in virtual machine with minimal modification to library,"
The 7th International Workshop on Security (IWSEC2012), poster (11, 2012).
Toshihiro Tabata,Masahiro Uemura,
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method,"
Japan-Taiwan Joint Research on Cryptography and Information Security towards Next IT-society,pp.133-137,(10,2008).
Amril Syalim,Toshihiro Tabata,Kouichi Sakurai:
"Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties,"
Symposium on Cryptography and Information Security 2006 (SCIS2006), (1, 2006). [PDF]
Amril Syalim, Toshihiro TABATA and Kouichi SAKURAI:
"A Model to Partially Outsourcing Access Control for Databases,"
Computer Security Symposium 2005 (CSS2005), (10, 2005). [PDF]
Amril Syalim, Toshihiro TABATA and Kouichi SAKURAI:
"Outsourced Access Control Model for Outsourced Databases,"
2nd Japan/U.S. Workshop on Critical Information Infrastructure Protection, poster, (6, 2005).
アムリル シャリム,田端 利宏,櫻井 幸一:
"Usage Control Model for Data Confidentiality Problem in Database Service Provider,"
2005年 暗号と情報セキュリティシンポジウム (SCIS2005),(1, 2005).