Year 2009 or earlier | Year 2010--2019 | Year 2020
Award Book
  1. 佐藤周行, 笠松隆幸, 田村拓也, 小林勇範: 情報セキュリティ基盤論, 共立出版, 2010.

Refereed
  1. 斎藤雄太, 佐藤周行: 確率密度関数を用いたソフトウェアテスティングのためのテストケース優先順位付け戦略, 情報処理学会論文誌 プログラミング, Vol. 12 No. 3, 1--8, July, 2019. (ASTER 第13回善吾賞)
  2. Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato and Atsushi Kanai: A Proposed for Data Management-Portfolio of fog-to-cloud computing systems, Proc. 8th International Congress on Advanced Applied Informatics, July 7--12, 2019, Toyama
  3. Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato and Atsushi Kanai: An Edge Computing Platform Management: Design for F2C and F2F for Small Business, in Proc. 8th International Congress on Advanced Applied Informatics, July 7--12, 2019, Toyama
  4. Toru Kobayashi, Kenichi Arai, Tetsuo Imai, Shigeaki Tanimoto, Hiroyuki Sato and Atsushi Kanai: Communication Robot for Elderly based on Robotic Process Automation, in Int'l Workshop of Consumer Devices and Systems (COMPSAC Workshop), 251--256, July, 2019, Milwaukee.
  5. Hiroyuki Sato, Nikita Sridhar: An Interactive and Continuous Authorization Scheme by using Belnap Logic, Int'l Workshop of Secure Digital Identity Management (COMPSAC Workshop), 682--687, July, 2019, Milwaukee,
  6. Gen Li, Hiroyuki Sato: A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain, in Int'l Workshop of Secure Digital Identity Management (COMPSAC Workshop), 694--699, July, 2019, Milwaukee.
  7. Hiroyuki Sato, Noriyasu Yamamoto: Elastic Trust Model for Dynamically Evolving Trust Frameworks, Trans. IEICE Vol. E102-D, No. 9, Special Issue on Log Data Usage Technology and Office Information Systems, 1617--1624, Sept. 2019.
  8. Shigeaki Tanimoto, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, Atsushi Kanai: Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines, Proc. 22nd Int'l Conf. Network-Based Information Systems (NBiS-2019), 413--422, Sept. 2019.
  9. Somchart Fugkeaw, Hiroyuki Sato: Enabling Dynamic and Efficient Data Access Control in Cloud Computing based on the Attribute Ceriticate Management and CP-ABE, Proc. 26th Euromicro international Conf. Parallel, Distributed and Network-based Processing, Cambridge, March, 2018, 454--461.
  10. Hiroyuki Sato, Shigeaki Tanimoto, Toru Kobayashi, Atsushi Kanai: Adaptive Policy Evaluation Framework for Flexible Service Provision, Proc. Service Oriented Software Engineering 2018, Bamberg, March, 2018, 124--131.
  11. 谷本 茂明, 上田 祥仁, 岩下 基, 畑島 隆, 川村 亨, 佐藤 周行, 小林 透, 金井 敦: マイナンバーのセキュアな運用モデルの提案, 電子情報通信学会論文誌 D(Letter), Vol. J101-D No. 10, 1443-1447, 2018.
  12. Cosmas K. Adiputra, Rikard Hjort, Hiroyuki Sato: A Proposal of Blockchain-based Electronic Voting System, in World Conf. Smart Trends in Systems, Security and Sustainability (WS4), 22--27, 2018.
  13. Somchart Fugkeaw, Hiroyuki Sato: Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems, Proc. CLOSER 2017, 530--536, Porto, Portugal, April 24--26, 2017.
  14. Somchart Fugkeaw, Hiroyuki Sato: Achieving Scalable and Optimized Attribute Revocation in Cloud Computing, IEICE Transactions on Information and Systems, vol.E100-D, No. 5, 973--983, 2017.
  15. Prajak Chertchom, Shigeaki Tanimoto, Hayato Ohba, Tsutomu Kohnosu, Toru Kobayashi, Hiroyuki Sato, and Atsushi Kanai: A lifelog data portfolio for privacy protection based on dynamic data attributes in a lifelog service, IEEE/ACIS Int'l Conf. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, (SNPD2017), Springer SCI vol. 721, 107--120, Kanazawa, Kinrosha Plaza, June 26--28, 2017.
  16. Lei Ma, Bing Yu, Cheng Zhang, Hiroyuki Sato: Collaborative Computation Offloading in Heterogeneous Asynchronous Cloud Environment, Proc. COMPSAC 2017 vol. 1, July 7, 929--934, 2017.
  17. SATO Hiroyuki, SEINO Yoshihiro, OGATA Takanori, SHIMOKAWA Tatsuya: Detection of Irregularities and Rips by Finding Critical Points of Morse Theory – Preliminary Results on Analysis on Sales Data–, COMPSAC Proceedings vol 2 (DASC: The 1st IEEE International COMPSAC Workshop on Data Science Challenges in Algorithm and Complexity), July 8, 386--390, 2017. DOI 10.1109/COMPSAC.2017.106
  18. Somchart Fugkeaw, Hiroyuki Sato: Scalable and Secure Access Control Policy Update for Outsourced Big Data, Future Generation Computer Systems, 2017. https://doi.org/10.1016/j.future.2017.06.014
  19. SATO Hiroyuki: Authorization by Documents, Journal of Information Processing vol. 25, 766--774, 2017.
  20. Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura: User Identification of Pseudonyms without Identity Information Exposure -- A Scenario in Access Federations, Journal of Information Processing, 25, 788-795, 2017.
  21. Shigeaki Tanimoto, Shun Totsuka, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato and Atsushi Kanai: 'Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era, Proc. Advances in Network-based Information Systems, Lecture Notes on Data Engineering and Coomunication Technologies 7, Springer, August, 737--749, Tronto, 2017.
  22. Shigeaki Tanimonot, Tsutomu Konosu, Motoi Iwashita, Shinsuke Matsui, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai: Risk Assessment Considerting Configuration of Hybrid Cloud Computing, Chap6 of Advances in Networks, Security and Communications: Reviews, Vol. 1, 171--185, 2017.
  23. Yamato Miura, Naoki Wakabayashi, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto and Hiroyuki Sato: 'A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-Cloud, Proc. Advances in Netowrk-based Information Systems, Lecture Notes on Data Engineering and Communication Technologies 7, Springer, August, 888--900, Tronto, 2017.
  24. Sato Hiroyuki, Ogata Takanori: Trust for Data and Data Platforms in the Cyber-world, Proc. Cyberworld 2017, Chester, September 20--22, 245--248, 2017. DOI 10.1109/CW.2017.31
  25. Toru KOBAYASHI, Kenichi ARAI, Hiroyuki SATO, SHigeaki TANIMOTO, Atsushi KANAI: An Application Framework for Smart Education System based on Mobile and Cloud Systems, IEICE Transactions Vol. E100-D, no. 10, 2399--2410, 2017.
  26. Hayato OHBA, Shigeaki TANIMOTO, Takashi HATASHIMA, Teruo ENDOU, Hiroyuki SATO, Atsushi KANAI: A Study of Efficent Team Management Configuration for CSIRT Deployment, Proc. 11th int'l Conf. Project Management (ProMAC 2017), 613--620, 2017.
  27. Kanai, A., Tanimoto, S., Sato, H.:Performance Evaluation on Secure Data Management Approach for Multiple Clouds Using Secret Sharing Scheme, in Int'l Conf. Consumer Electronics 2016, Jan. Las Vegas, 2016.
  28. Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato: Evaluation of Selecting Cloud Services Approach for Data Storage using Secret Sharing Scheme, The Sixth International Conference on Performance, Safety and Robustness in Complex Systems and Applications (PESARO 2016), Feb. Lisbon, 2016.
  29. Lei Ma, Cyrille Valentin Artho, Cheng Zhang, Hiroyuki Sato, Johannes Gmeiner and Rudolf Ramler: Guiding Random Test Generation with Program Analysis, Proc. Software Engineering 16 (SE16), 15--16,Feb. 23--26, Wien, 2016.
  30. Kazutsuna Yamaji, Motonori Nakamura, Yashihiro Nagai, Tomohiro Ito, Hiroyuki Sato: Specifying a Trust Model for Academic Cloud Services, Proc. IEEE Int'l Conf. Mobile Cloud 2016 91--99 (Invited), Oxford, 2016.
  31. SATO Hiroyuki, KANAI Atsushi, TANIMOTO Shigeaki, KOBAYASHI Toru: Establishing Trust in the Emerging Era of IoT, Proc. IEEE Int'l Conf. Service-Oriented System Engineering 2016 398--406 (Invited), Oxford, 2016.
  32. Somchart Fugkeaw, Hiroyuki Sato: Embedding Lightweight Proxy Re-Encryption for Efficient Attribute Revocation in Cloud Computing, Int'l J. High Performance Computing and Networking, Vol. 9 No. 4, 2016, 299--309.
  33. SATO Hiroyuki, OKABE Yasuo, NAKAMURA Motonori: User Identification of Pseudonyms without Identity Information Exposure in Access Federations, IEEE COMPSAC 2016, 487--492, Atlanta, 2016.
  34. Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motoori Nakamura: An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other, IEEE MidCCI 2016(COMPSACW), Vol.2 , 202--207, Atlanta, 2016.
  35. Shigeaki Tanimoto, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai: Risk Assessment Quantification of Social-media Utilization in Enterprise, IEEE/ACIS Int'l Conf. Computer anc Information Science, Okayama, June, 2016, 989--994.
  36. Shigeaki Tanimoto, Rei Kinno, Motoi Iwashita, Tohru Kobayashi, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai: Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service, IIAI Int'l Conf. Advanced Applied Informatics, Kumamoto, June, 2016, 1126--1131.
  37. Somchart Fugkeaw, Hiroyuki Sato: Improved Lightweight Proxy Re-Encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing, Proc. IEEE CLOUD, San Francisco, July, 2016.
  38. Somchart Fugkeaw, Hiroyuki Sato: An Agent-based Modeling for Cloud-based Access Control, Proc. IEEE BigData Congress, San Francisco, July, 2016.
  39. Fugkeaw Somchart, Hiroyuki Sato: Updating Policies in CP-ABE-based Access Control: An Optimized and Secure Service, in The European Conference on Service-Oriented and Cloud Computing (ESOCC), September, 2016.
  40. Shigeaki Tanimoto, Shunsuke Shiraki, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato and Atsushi Kanai: Assessment Based on User's Viewpoint for Mobile Ad Hoc Network, 10-th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2016), Ostrava, September, 2016
  41. Lei Ma, Cheng Zhang, Bing Yu, Hiroyuki Sato: An empirical study on the effects of code visibility on program testability, Software Quality Journal, Springer, 1--28, 2016.
  42. 米田翔一, 大角地涼介, 谷本茂明, 佐藤周行, 金井敦: TPO条件に基づく複数クラウドにおける動的クラウド選択手法の提案 電子情報通信学会論文誌Vol.J99-D,No.10,pp.1045-1049, Oct. 2016.
  43. 米田翔一, 畑健一郎, 下村道夫, 谷本茂明, 佐藤周行, 金井敦: センサ活用に基づく情報セキュリティエコノミクス: ISMSにおける費用対効果の効率化に関する検討, 情報処理学会論文誌, Dec. 2016.
  44. Chapa Martell Mario Alberto, SATO, Hiroyuki: Linear Performance-Breakdown Model: A Framework for GPU kernel programs performance analysis, Int'l J. Networking and Computing, Vol 5, No 1, 86--104, 2015.
  45. Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai: Risk Assessment Quantification of Ambient Service, Proc. Int'l Conf. Digital Society, IARIA, Feb, 70--75, 2015.
  46. Yuuki Kajiura, Shohei Ueno, Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato: An Approach to Selecting Cloud Services for Data Storage in Heterogeneous-multicloud Environment with High Availability and Confidentiality, Proc. 12th Int'l Symp. Autonomous Decentralized System, March, 205--210, 2015.
  47. Lei Ma, Cheng Zhang, Bing Yu and Hiroyuki Sato: An Empirical Study on Effects of Code Visibility on Code Coverage of Software Testing, Proc. 10th International Workshop on Automation of Software Test, May, 80--84, 2015.
  48. Lei Ma, Cyrille Artho, Cheng Zhang, Hiroyuki Sato: GRT at the SBST 2015 Tool Competition, Proc. 8th Int'l Workshop on Search-based Software Testing, May, 48--51, 2015.
  49. Somchart Fugkeaw, Hiroyuki Sato: An extended CP-ABE based Access control model for data outsourced in the cloud, Proc. MidCCI 2015, (COMPSACW), July, 73--78, 2015.
  50. 佐藤周行, 岡部寿男, 中村素典: 認証連携における仮名性を担保したユーザ同一性の確認, Proc. DICOMO 2015, July, 890--895, 2015. (優秀論文賞)
  51. Shigeaki Tanimoto, Atsuhi Kanai, Hiroyuki Sato: Risk Assessment Quantification in Hybrid Cloud Configuration, in Proc. SECURWARE Aug. 23--28, 2015. 1--6, 2015.
  52. Shigeaki Tanimoto, Takayuki Kakuta, Hiroyuki Sato, Atsushi Kanai: A Study of Cost Structure Visualization for Digital Forensics Deployment, Proc. 4th IIAI International Congress on Advanced Applied Informatics, July 13. 428--431, 2015.
  53. Fugkeaw, S. and Sato, H.: Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud, Proc. Int'l 2015 Workshop on Cloud Security and Forensics, Toulouse, August. 576--583, 2015.
  54. Shoichi Yoneda, Shigeaki Tanimoto, Tsutomu Konosu, Hiroyuki Sato, Atsushi Kanai: Risk Assessment in Cyber-physical System in Office Environment, 9-th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2015), Sep 2-4, Taipei, 2015.
  55. Lei Ma, Cyrille Artho, Cheng Zhang, Hiroyuki Sato, Johannes Gmeiner and Rudolf Ramler: GRT: Program-Analysis-Guided Random Testing, in Int'l Conf. Automated Software Engineering 2015, Nov. (Distinguished Paper Award), 212--223, 2015.
  56. Lei Ma, Cyrille Arthoy, Cheng Zhangx, Hiroyuki Sato, Johannes Gmeinerz, Rudolf Ramlerz: GRT: An Automated Test Generator using Orchestrated Program Analysis, Int'l Conf. Automated Software Engineering 2015, Nov., Lincoln, pp. 842--847, 2015.
  57. Fugkeaw, S., Sato, H.: CLOUD-CAT: A Collaborative Access Control Tool for Data Outsourced in Cloud Computing, in Proc. Int'l Conf. Digital Information Management, Oct. 21--23, Gyeongju, 2015.
  58. Hokino, M., Fujiki, Y., Onda, S., Kaneko, T., Sakimura, N., Sato, H.: A Practical Trust framework: Assurance Levles Repackages through Analysis of Business Scnarios and related Risks, in Proc. Security Standardisation Research 2015, LNSC 9497, Dec. 15--16, 2015, Tokyo. pp. 203--217, 2015.
  59. Lei Ma, Cyrille Artho, Hiroyuki Sato: Managing Product Variants by Project Centralization, Lecture Notes on Software Engineering, 2(2), May, 195--200, 2014.
  60. Lei Ma, Cyrille Artho, Hiroyuki Sato: A Graph Coloring Based Approach for Project Centralization, Proc. ACM Symp. Applied Computing 2014.
  61. SATO Hiroyuki, OKABE Yasuo, NISHIMURA Takeshi, YAMAJI Kazutsuna, NAKAMURA Motonori: Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach, Journal of Information Processing 22(3), 464--471, 2014.
  62. TAKESHI NISHIMURA, MOTONORI NAKAMURA, KAZUTSUNA YAMAJI, HIROYUKI SATO, YASUO OKABE, Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding, Journal of Information Processing 22(3), 472--479, 2014.
  63. Chapa Martell, M., Sato, H.: A Linear Performance-Breakdown Model for GPU Programming Optimization Guidance, in 16th Workshop on Advances on Parallel and Distributed Processing Systems, 2014.
  64. S. Tanimoto, K. Takahashi, T. Yabuki, K. Kato, M. Iwashita, H. Sato and A. Kanai: Risk Assessment Quantification in Life Log Service, in SNPD 2014, 2014.
  65. SATO Hiroyuki, TANIMOTO Shigeaki, KANAI Atsushi: A Policy Consumption Architecture that enablesDynamic and Fine Policy Management, Proc. 3rd ASE International Conf. CyberSecurity 2014.
  66. Atsushi Kanai, Shigeaki Tanimoto, Hiroyuki Sato: Data Management Approach for Multiple Clouds using Secret Sharing Scheme, in 8th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2014), 2014.
  67. Shigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai: A Study of Risk Assessment Quantification in Cloud Computing, in 8th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2014), 2014.
  68. 米田 翔一, 谷本茂明, 佐藤周行, 金井敦: オフィス空間における場のセキュリティを考慮したリスクアセスメント, in FIT 2014.
  69. Lei Ma, Cyrille Artho, Cheng Zhang and Hiroyuki Sato: Efficient Testing of Software Product Lines via Centralization, in GPCE 2014.
  70. Shigeaki Tanimoto, Yorihiro Sakurada, Yoshiaki SEKI, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai, A Study of Data Management in Hybrid Cloud Configuration, Computer Information Science, Vol. 492, 247--257, 2013.
  71. 谷本, 関, 岩下, 佐藤, 金井:ビッグデータを活用したサービスに関するリスクアセスメント, 電子情報通信学会論文誌A, Vol.J96-A, No. 4, 189--194, 2013.
  72. 西村 健, 中村 素典, 山地 一禎, 佐藤 周行, 大谷 誠, 岡部 寿男, 曽根原 登: 参加者ごとに異なるポリシーを反映可能な認証フェデレーション機構の実現, 電子情報通信学会論文誌D, Vol.J96-D, No. 6, 1400--1412, 2013.
  73. SATO, Hiroyuki, OKABE, Yasuo, NISHIMURA, Takeshi, YAMAJI, Kazutsuna, NAKAMURA, Motonori: Privacy Enhancing Proxies in Attribute Releases: Two Approaches, COMPSAC W(MidArch 2013), 379--384, 2013.
  74. Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe: Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities Across Shibboleth SPs, COMPSAC W(MidArch 2013), 367--372, 2013.
  75. Lei Ma, Cyrille Artho, Hiroyuki Sato: Analyzing Distributed Java Applications by Automatic Centralization, COMPSAC W(IEESD & TIP 2013), 691--696, 2013.
  76. Yuuki KAJIURA, Atsushi KANAI, Hiroyuki SATO, Shigeaki TANIMOTO: A File-distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud, COMPSAC W(SAPSE 2013), 212--217, 2013.
  77. Mario Chapa and Sato Hiroyuki: Performance Model for the Impact of Hardware Characteristics in Accelerated Processing Units, The 19th International Conference on Parallel and Distributed Processing Techniques and Applications, 343--349, 2013.
  78. Shoichi Yoneda, Shun Makino, Shigeaki Tanimoto, Hiroyuki Sato, Atsushi Kanai: Information Security Management System with Physical Security - Improvement of Risk Recognition Function with Multi-sensor –, 7th International Conference on Project Management (PROMAC), 2013.
  79. Daisuke Obata, Shigeaki Tanimoto, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai: Business Continuity Planning / Disaster Recovery Configuration for Deployment with Cloud Computing, 7th International Conference on Project Management (PROMAC), 2013.
  80. Lei Ma, Cyrille Artho, Hiroyuki Sato: Managing Product Variants by Project Centralization, in 2013 6th International Conference on Computer Science and Information Technology (ICCSIT 2013), 2013.
  81. Lei Ma, Cyrille Artho, Hiroyuki Sato: Improving Automatic Centralization by Version Separation, IPSJ Transactions (PRO) 6(4) 65--77, 2013.
  82. Tatsuya Miyagami, Atsushi Kanai, Noriaki Saito, Shigeaki Tanimoto, Hiroyuki Sato: Alternation methodology of schedule information on public cloud for preserving privacy. Proc. Int'l Conf. Digital Society 2012, 132--139, 2012.
  83. Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Astushi Kanai: Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement, Journal of Information Processing 20(3), 640--648, 2012.
  84. 島岡正基, 西村健, 古村隆明, 中村素典, 佐藤周行, 岡部寿男, 曽根原登: 学術機関のためのサーバ証明書発行フレームワーク, 電子情報通信学会論文誌, B, J95-B(7), 871--882, 2012.
  85. Tran Quang, Hiroyuki Sato: A Solution for Privacy Protection in MapReduce, Proc. 36th COMPSAC 2012, 515--520, 2012.
  86. Shigeaki TANIMOTO, Shinichi MIZUHARA, Msasahiko YOKOI, Hiroyuki SATO, Atsushi KANAI: Analysis of Security of PKI Operation with MultipleCP/CPS Based on Level of Assurance, Proc. COMPSACW (MidArch), 100--105, 2012.
  87. 横谷 百合, 宮上 達矢, 金井 敦, 谷本 茂明, 佐藤 周行: クラウドスケジュールサービスにおける日付偽装のための鍵共有方式の検討, Proc. DPS Workshop 2012 (30), 2012.
  88. 宮上 達矢, 横谷 百合, 金井 敦, 斉藤 典明, 谷本 茂明, 佐藤 周行: クラウドスケジュールサービスにおけるプライバシー保護のための日付偽装方式の評価, Proc. DPS Workshop 2012 (31), 2012.
  89. Sato, H.: A Formal Model of LoA Elavation in Online Trust ASE Science Journal 1(4), 166--178, 2012.
  90. Sato, H., Kanai, A., Tanimoto, S.: Building a Security Aware Cloud by Extending Internal Control to Cloud, Proc. 10th Int'l Symposium on Autonomous Decentralized Systems (ISADS 2011), 323--326., 2011.
  91. Shigeaki Tanimoto, Manami Hiramoro, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai: Risk Management on the Security Problem in Cloud Computing, Proc. Conference on Computers, Networks, Systems and Industrial Engineering (CNSI 2011), 147--152, 2011.
  92. SATO, H., KUBO, A.: Graded Trust of Certificates and its Management with Extended Path Validation, Journal of Information Processing, vol. 19, 263--273, 2011.
  93. Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, tsushi Kanai: Quantifying Cost Structure of Campus PKI, Proc. 11th Int'l Symp. Applications and the Internet (SAINT), MIDARCH 2011, 315--320, 2011.
  94. SATO, H., NISHIMURA, T.: Federated Authentication in a Hierarchy of IdPs by using Shibboleth, Proc. 11th Int'l Symp. Applications and the Internet (SAINT), MIDARCH 2011, 327--332, 2011.
  95. SATO, H.: A New Formula of Information Security Risk Analysis that takes Risk Improvement Factor into Account, Proc. IEEE 3rd Int'l Conf. Privacy, Security, Risk and Trust, 1243--1248, 2011.
  96. 藤巻文孝,金井敦,斉藤典明,谷本茂明,佐藤周行、“情報資産価値を用いた最適保存先決定手法”情報 処理学会 第19回 マルチメディア通信と分散処理ワークショップ (DPSWS2011), 2011.
  97. Kubo, A., Sato, H.: Design of Graded Trusts by Using Dynamic Path Validation , Trust Management IV (IFIP AICT 321), 172--183, 2010.
  98. Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in Security Aware Cloud, Proceedings of 10th International Symposium oo Applications and the Internet (SAINT 2010), 121--124, 2010.
  99. Shigeaki Tanimoto, Satoru Kurosaki, Tsuyoshi Takamoto, Kazunori Hayashi, Shinichi Mizuhara, Toshihiko Moriya, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai: Managing PKI Deployment and Operation Based on Assurance Levels and Cost Structure, in ProMAC 2010 (October), 2010.

Others
  1. 谷本茂明, 黒崎 悟, 高本剛志, 林 和範, 水原真一, 守屋利彦, 横井雅彦, 佐藤周行, 金井 敦:キャンパスPKIにおけるコスト構造に関する研究, IEICE LOIS研究会, 9月21日.
  2. 佐藤周行, 金井敦, 谷本茂明: セキュリティ・アウエア・クラウド:概念とモデル, CSS 2010 論文集, pp 339--344, 2010.
  3. SATO, Hiroyuki: Building a Security Aware Cloud by Extending Internal Control over Cloud, Proc. Global COE Symposium on Secure Life Electronics, 2010.
  4. 真子拓馬, 佐藤周行: インライン展開による最適化の加速の度合いの計測およびフィードバック手法, ISPJ PRO 82 (oral), 2011.
  5. 谷本茂明, 黒崎悟, 高本剛志, 林和範, 水原真一, 守屋利彦, 横井雅彦, 佐藤周行, 金井敦: キャンパスPKIのコスト構造定量化に関する検討, 電子情報通信学会全国大会予稿集 D-9-36, 2011.
  6. 馬 雷, 佐藤周行: An Annotated Type System for Inlining, 情報処理学会プログラミング研究会 PRO-84, 2011.
  7. Sato, Hiroyuki: Trust Engineering in Distributed ICT Environments, 2-30, Int'l Symposium of Secure-Life Electronics -- Advanced Electronics and Information Systems for Quality Life and Society, 2012.
  8. 鶴宙史, 佐藤周行: 依存条件グラフの解析による制御フロー予測の厳密化, ISPJ PRO 87, 2012 (oral)
  9. Tran Quang, 佐藤周行: MapReduceにおけるプライバシーの手法の提案, 2D1-5E, SCIS 2012
  10. Kazu Yamaji, Hiroyuki Sato, Takeshi Nishimura, Motonori Nakamura: Progress of Japanese academic access federation GakuNin in FY2011 –Introduction to LoA-, TERENA Networking Conference 2012 (Poster)
  11. 上村 宗嗣, 金井 敦, 谷本 茂明, 佐藤 周行: 偽装環境によるPC保護と不正操作者情報収集技術の提案, Proc. Computer Security Symposium 2012, 677--684.
  12. 末次 正人, 榎本 真也, 金井 敦, 谷本 茂明, 佐藤 周行: 侵入者の距離によりダイナミックにセキュリティレベルを制御す るシステムの検討 IPSJ SIGDPS, 154回研究会. March
  13. 米田 翔一, 牧野 駿, 谷本 茂明, 佐藤 周行, 金井 敦: 動的リスク評価に基づくセキュリティ場の提案, 春季PM学会, 1501. March
  14. 谷本 茂明, 見目 悠平, 菊地 修, 佐藤 周行, 金井 敦: 情報セキュリティマネジメントにおける保証レベルに関する検討, 春季PM学会, 1502. March
  15. 谷本茂明,小幡大輔,佐藤周行,金井敦: BCPクラウド化に対する費用対効果に関する研 究,プロジェクトマネジメント学会2013年度春季研究発表大会, 1503, 2013. March
  16. 中村素典, 西村健, 山地一禎, 佐藤周行, 岡部寿男: 学割サービス実現のための SAML-OpenID ゲートウェイの試作, IPSJ IOT研究会, 2013-IOT-21(28), 1--7. 2013, May.
  17. Motonori NAKAMURA, Takeshi NISHIMURA, Kazu YAMAJI, Hiroyuki SATO, Yasuo OKABE, Takao YAMASAKI, Tsuyoshi MINAMI, Nat SAIKIMURA: PEOFIAMP: Privacy Enhancements for Open Federated identity/Access Management Platforms, Terena Networking Conference 2013 (Poster), 2013 June 2, Maastricht.
  18. 岡部 寿男, 佐藤 周行, 西村 健, 山地 一禎, 中村 素典: 属性提供サーバに対してサービス提供サーバを秘匿する匿名化プロキシ, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム, 8F-2, 2013.
  19. 中村 素典, 西村 健, 山地 一禎, 佐藤 周行, 岡部 寿男, 山崎 崇生, 崎村 夏彦: 情報流通連携のためのオープンなID連携プラットフォームにおけるプライバシー保護機能の高度化, マルチメディア,分散,協調とモバイル(DICOMO2013)シンポジウム, 8F-4, 2013.
  20. 島岡正基, 佐藤周行: 学認における属性交換フレームワーク, コンピュータセキュリティシンポジウム 2013, 486--493, 高松, 2013年10月
  21. Sato, H., Tanimoto, S., Kanai, A.: Dynamic and Fine Grained Control of Policies by XMLed Policy management, 3C2-1, Proc. SCIS 2014.
  22. 本間博礼, 金井敦, 谷本茂明, 佐藤周行:人物フォーメーションを考慮した危険度定量化手法, 1A2-4, Proc. SCIS 2014.
  23. 菊池尚也, 金井敦, 谷本茂明, 佐藤周行:秘密分散を用いた複数クラウドのデータ管理方式, 3C1-5, Proc. SCIS 2014.
  24. 五十嵐綾, 金井敦, 谷本茂明, 佐藤周行: 秘密分散を用いたセキュリティ強度可変プロトコルの提案, 3F1-1, Proc. SCIS 2014.
  25. 岡部寿男, 佐藤周行, 山地一禎, 中村素典: 属性情報と認可条件を相互に秘匿する認証連携プロキシ, in 電子情報通信学会 インターネットアーキテクチャ研究会, 2014.
  26. 横谷 百合, 金井 敦, 谷本 茂明, 佐藤周行: ダイナミックなクラウド選択のためのSLAのXML化に関する提案, in 第158回DPS研究会, 2014.
  27. Kazu Yamaji, Kouji Nishimura, Yasuhiro Nagai, Hiroyuki Sato, Motonori Nakamura, Tomohiro Ito, Takeshi Nishimura, Yoshihiro Okada: Standard Levels of Authentication and Security for Use in Academic Japanese Cloud Services, in TNC 2014.
  28. Lei Ma, Cyrille Artho, Cheng Zhang, Hiroyuki Sato: When Project Centralization and Random Testing Meet –Efficient Automatic Testing of Multiple Software Product Variants–, 第31回ソフトウェア科学会大会, 8-2, 2014.
  29. 佐藤 周行, 谷本 茂明, 金井 敦: アクセス制御のための機械可読サービスポリシー文書, コンピュータセキュリティシンポジウム 2014, 1D4-1.
  30. 畑 健一郎・佐藤 彰・米田翔一・谷本茂明・佐藤周行・金井 敦: 情報セキュリティマネジメントシステムにおけるスローポリシー導入に関する検討, ライフインテリジェンスとオフィス情報システム研究会(LOIS), IEICE, Jan. 15, 2015.
  31. 平本拓也, 金井敦, 谷本茂明, 佐藤周行: セキュリティ場モデルの提案, 暗号と情報セキュリティシンポジウム(SCIS) 2015, 4C1-1.
  32. 篠山裕貴, 金井敦, 谷本茂明, 佐藤周行: LOAを考慮した動的クラウド選択基盤方式, 暗号と情報セキュリティシンポジウム(SCIS) 2015, 4B2-2.
  33. 大角地涼介, 佐藤亮太, 米田翔一, 谷本茂明, 佐藤周行, 金井敦: パブリッククラウドと企業ネットワークの セキュリティポリシー連携マネジメントに関する研, in プロジェクトマネジメント学会春季大会, 2015.
  34. 水元 明法, 佐藤 周行: 日本のアカデミアにおけるアイデンティティ管理の現状 -- 学認アンケートからみる現状の理解と将来の展望--, コンピュータセキュリティシンポジウム 2016, 秋田, October, 2016, 609--616.
  35. Hiroyuki Sato: ``Practical Correctness in ICT Environments,'' From the Editors, IEEE IT Professionals Magazine, vol. 18, No. 6, 4--8, 2016.
  36. Hiroyuki Sato: Internet Trust: Design and Deployment, Keynote, International Multi-Topic ICT Conference (IMTIC) 2018, Jamshoro, April, 2018.
  37. 谷本茂明,佐藤周行,川本祐子,秋葉淳哉: 医療情報と情報セキュリティマネジメント, オペレーションズ・リサーチ, Vol. 64, No. 7, 406--412, July, 2019.