scispace - formally typeset
Y

Yoshiki Sameshima

Researcher at Hitachi

Publications -  14
Citations -  248

Yoshiki Sameshima is an academic researcher from Hitachi. The author has contributed to research in topics: Incremental backup & Security policy. The author has an hindex of 5, co-authored 14 publications receiving 247 citations.

Papers
More filters
Journal ArticleDOI

Authorization with security attributes and privilege delegation

TL;DR: A new authorization scheme is introduced, an implementation of an information server which adopts the new scheme is presented, and a solution which refers to security information of other security domains through a directory service is proposed.
Patent

Information backup/restoration processing apparatus and information backup/restoration processing system

TL;DR: In this article, the authors propose to filter I/O access to a device from a file system on the basis of the data mapping information of the virtual volume, whereby read/write access to unnecessary portions is avoided.

SELinux Security Policy Configuration System with Higher Level Language (特集 人と組織の社会貢献を支えるコンピュータセキュリティ技術)

TL;DR: A security policy configuration system SEEdit is proposed which facilitates creating security policy by a higher level language called SPDL and SPDL tools which generate security policy configurations from access logs and tool user's knowledge about applications.
Proceedings Article

SEEdit: SELinux security policy configuration system with higher level language

TL;DR: Seedit as mentioned in this paper is a security policy configuration system that facilitates creating security policy by a higher level language called SPDL and SPDL tools, which reduces the number of permissions by integrated permissions and removes label configurations.
Book ChapterDOI

A Key Escrow System of the RSA Cryptosystem

TL;DR: In this article, a key escrow system of the RSA cryptosystem that protects user privacy with the following properties; (1) neither investigation agency nor key escrower agent accesses private key of user directly, (2) investigation agency can decrypt user data of restricted time period and communication entities, and (3) split private keys of user are deposited correctly in multiple key escrows without any information leakage of the private key with help of a zero-knowledge interactive protocol.